Cato SASE

Cato SASE

Cato Networks
Forcepoint CASB

Forcepoint CASB

Forcepoint
+
+

Related Products

  • Cloudbrink
    28 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Cloudflare
    1,995 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,061 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Wiz
    1,446 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    122 Ratings
    Visit Website
  • ScreenMeet
    33 Ratings
    Visit Website

About

Cato enables customers to gradually transform their WAN for the digital business. Cato SASE Cloud is a global converged cloud-native service that securely and optimally connects all branches, datacenters, people, and clouds. Cato can be gradually deployed to replace or augment legacy network services and security point solutions. Secure Access Service Edge (SASE) is a new enterprise networking category introduced by Gartner. SASE converges SD-WAN and network security point solutions (FWaaS, CASB, SWG, and ZTNA) into a unified, cloud-native service. In the past, network access was implemented with point solutions, managed as silos that were complex and costly. This hurt IT agility. With SASE, enterprises can reduce the time to develop new products, deliver them to the market, and respond to changes in business conditions or the competitive landscape.

About

Give your company the full potential of the cloud. But don't let it cost you the control of your data. Now a Cloud Access Security Broker solution can support any cloud app, managed or unmanaged, securely. Forcepoint CASB works with IdP like Ping and Okta. Segments you’ve already built can be re-used with CASB. Don’t have IdP yet? CASB works like an IdP allowing your team to easily add apps and control individual access to apps. The simple interface is easy for employees to use too. Shadow IT puts data outside of your control. Quickly identify managed and unmanaged cloud apps in real-time using your web proxy and firewall logs. Detect stolen credentials sooner with a patent-pending Zero Trust Impossible Travel which shows individual device method, location, and time of day. Data moves up to the cloud, down from it, and from cloud to cloud. Protect data in motion or at rest. Block data in transit, encrypt or mask it, redact it, or watermark it to track sensitive data.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises and companies seeking a solution to manage all their operations and processes

Audience

IT teams requiring a cloud access security broker to improve their protection

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$1.00/year
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cato Networks
Founded: 2015
Israel
www.catonetworks.com

Company Information

Forcepoint
Founded: 1994
United States
www.forcepoint.com

Alternatives

Bigleaf

Bigleaf

Bigleaf Networks

Alternatives

Perimeter 81

Perimeter 81

Check Point Software Technologies
Check Point CloudGuard

Check Point CloudGuard

Check Point Software Technologies
VersaONE

VersaONE

Versa Networks
FortiSASE

FortiSASE

Fortinet
FortiCASB

FortiCASB

Fortinet
Versa SASE

Versa SASE

Versa Networks
Censornet CASB

Censornet CASB

Censornet

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

IT Management Features

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Integrations

Active Directory
Axonius
Azure Marketplace
Blink
Covver
Daylight
Forcepoint ONE
Fuze
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Indent
OneTrust Privacy Automation
Scuba Database Vulnerability Scanner
Tarsal

Integrations

Active Directory
Axonius
Azure Marketplace
Blink
Covver
Daylight
Forcepoint ONE
Fuze
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Indent
OneTrust Privacy Automation
Scuba Database Vulnerability Scanner
Tarsal
Claim Cato SASE and update features and information
Claim Cato SASE and update features and information
Claim Forcepoint CASB and update features and information
Claim Forcepoint CASB and update features and information