SlideShare a Scribd company logo
Global Backbone SD-WAN Firewall as a Service
All in one
Software-defined Perimeter
Inside Cato Networks
Management Platform
1
Cato Networks provides a converged, cloud-based networking and security platform connecting
all of your corporate locations, cloud assets and mobile users. All network and security
management is done through the Cato Management Application, a self-service console that
provides a single view into the entire global network.
Cato Management Application: Enterprise Network Overview
2
When you first come into the Cato
Management Application you’re see an
overview of your network.
The main topology screen shows all sites,
datacenters, and mobile users connected
to the Cato Cloud. You can click any object
to see more information and change
configuration or policies.
On your left side, are options to drill down
into networking and security aspects of
your implementation.
On your right side, is a snapshot of the
overall network performance. Let’s take a
deeper look at some aspects of the Cato
Management Application.
SECURITY POLICIES
3
Cato Management Application: WAN Firewall
4
The WAN Firewall is where you set access
policies between the company different
resources.
Cato Management Application: WAN Firewall
5
Drilling down, you can see it allows you to segment
the network and enable access based on user
identities or location.
Cato Management Application: Internet Firewall
6
All Internet-bound traffic is controlled by
the Internet Firewall. It is fully identity-
and application-aware so the admin can
set specific access policies based on the
users’ AD groups or roles.
Cato Management Application: Internet Firewall
7
Drilling down, you can see it’s fully
identity- and application-aware so the
admin can set specific access policies
based on the users’ AD groups or roles.
NETWORK CONFIGURATION
8
Policy-Based Routing and Last-Mile Resilience
9
Once the traffic is classified, we dynamically route it based on real-time link quality….
Policy-Based Routing and Last-Mile Resilience
10
Policy-based Routing
Policy-based routing empowers the admin to
decide per application which transport to use,
it can be via Cato or another transport, like
MPLS.
Policy-Based Routing and Last-Mile Resilience
11
Cloud Optimization
Route/NAT enables configuration of egress points via
a specific Cato PoP. Cato accelerate business
application access to physical or cloud datacenters by
carrying designated traffic across the Cato Cloud
network, dropping it right at the doorstep of the
datacenter.
Policy-Based Routing and Last-Mile Resilience
12
Acceleration
Active TCP Acceleration enables Cato’s TCP Proxying capabilities to
increase TCP throughput.
Packet loss mitigation duplicates packet across multiple links to
overcome the packet loss.
Quality of Service Visibility
13
QoS Priorities
The real-time analytics allows the admin the visibility
to each link live performance, its ordered by the
priorities configured by the admin.
Quality of Service Visibility
14
QoS Priorities Each priority receives a MOS score based on the service level. Admins can
click any priority for additional information about performance, on which
transport, top applications, and the top hosts consuming bandwidth
IDENTITY AWARENESS
15
Cato introduced identity-aware routing in July, 2018. Identity awareness
abstracts policy creation from the network and application architecture,
enabling business-centric routing policies based on user identity and group
affiliation.
Identity-Aware SD-WAN Policy
ApplicationQoS Identity
With identity awareness, traffic can be easily prioritized within an application
16
Identity Awareness Is Also Integrated in the Reporting
17
The admin can
monitor specific
user activities for
advanced
troubleshooting
and monitoring
REPORTING AND ANALYTICS
18
Network Analytics
19
Cato provides deep and robust network analytics metrics on all traffic per
location. It gives the administrator a powerful tool to troubleshoot any
aspect of the network.
Network Analytics
20
Cato robust reporting for advanced troubleshooting
Drilling down we can see a site with two internet links and its performance
over time. Detailed information about throughput, packet loss, and jitter are
available for advanced troubleshooting.
Real-time Network Analytics
21
The real-time network analytics is another powerful tool that enables visibility
to the site’s active links. The admin can see aggregated statistics or click any link
for detailed information.
Real-time Network Analytics
22
For example, by clicking WAN1, a real-
time usage presented with details of the
users and the applications using the link.
23
https://www.catonetworks.com

More Related Content

What's hot

Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
David kankam
 
Branchements individuels souterrains et aéro souterrains à puissance limitée
Branchements individuels souterrains et aéro souterrains à puissance limitéeBranchements individuels souterrains et aéro souterrains à puissance limitée
Branchements individuels souterrains et aéro souterrains à puissance limitée
BenRejabHichem
 
3 aruba arm and cm
3 aruba arm and cm3 aruba arm and cm
3 aruba arm and cm
Venudhanraj
 
Example for configuring local attack defense
Example for configuring local attack defenseExample for configuring local attack defense
Example for configuring local attack defense
Huanetwork
 
OpenShift on OpenStack with Kuryr
OpenShift on OpenStack with KuryrOpenShift on OpenStack with Kuryr
OpenShift on OpenStack with Kuryr
Antoni Segura Puimedon
 
Outdoor MIMO Wireless Networks
Outdoor MIMO Wireless NetworksOutdoor MIMO Wireless Networks
Outdoor MIMO Wireless Networks
Aruba, a Hewlett Packard Enterprise company
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architecture
SagarR24
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
sushil kumar
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
Mostafa El Lathy
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)
slide_site
 
DEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
DEM14 Extending the Cisco SD-WAN Fabric to the AWS CloudDEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
DEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
Amazon Web Services
 
Software Defined WAN – SD-WAN
Software Defined WAN – SD-WANSoftware Defined WAN – SD-WAN
Software Defined WAN – SD-WAN
MarketingArrowECS_CZ
 
IP衝突時,該如何修改netis分享器的IP位址
IP衝突時,該如何修改netis分享器的IP位址IP衝突時,該如何修改netis分享器的IP位址
IP衝突時,該如何修改netis分享器的IP位址
臺灣塔米歐
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy concepts
Mostafa El Lathy
 
Cisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowCisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment Workflow
Farooq Khan
 

What's hot (16)

Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
 
Branchements individuels souterrains et aéro souterrains à puissance limitée
Branchements individuels souterrains et aéro souterrains à puissance limitéeBranchements individuels souterrains et aéro souterrains à puissance limitée
Branchements individuels souterrains et aéro souterrains à puissance limitée
 
3 aruba arm and cm
3 aruba arm and cm3 aruba arm and cm
3 aruba arm and cm
 
Example for configuring local attack defense
Example for configuring local attack defenseExample for configuring local attack defense
Example for configuring local attack defense
 
OpenShift on OpenStack with Kuryr
OpenShift on OpenStack with KuryrOpenShift on OpenStack with Kuryr
OpenShift on OpenStack with Kuryr
 
Outdoor MIMO Wireless Networks
Outdoor MIMO Wireless NetworksOutdoor MIMO Wireless Networks
Outdoor MIMO Wireless Networks
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architecture
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)
 
DEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
DEM14 Extending the Cisco SD-WAN Fabric to the AWS CloudDEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
DEM14 Extending the Cisco SD-WAN Fabric to the AWS Cloud
 
Software Defined WAN – SD-WAN
Software Defined WAN – SD-WANSoftware Defined WAN – SD-WAN
Software Defined WAN – SD-WAN
 
IP衝突時,該如何修改netis分享器的IP位址
IP衝突時,該如何修改netis分享器的IP位址IP衝突時,該如何修改netis分享器的IP位址
IP衝突時,該如何修改netis分享器的IP位址
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy concepts
 
Palo alto-review
Palo alto-reviewPalo alto-review
Palo alto-review
 
Cisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment WorkflowCisco SDWAN - Components Deployment Workflow
Cisco SDWAN - Components Deployment Workflow
 

Similar to Inside the Cato Networks Management Console

Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Canada
 
CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session  CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session
Joseph Holbrook, Chief Learning Officer (CLO)
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
Cisco Enterprise Networks
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
E.S.G. JR. Consulting, Inc.
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerce
r_arorabms
 
Software Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
Software Defined Networking/ Networking/ Traditional Networking/ SDN BenefitsSoftware Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
Software Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
Mehak Azeem
 
LD7007 Network Security.docx
LD7007 Network Security.docxLD7007 Network Security.docx
LD7007 Network Security.docx
stirlingvwriters
 
ICC Data and Device management
ICC Data and Device managementICC Data and Device management
ICC Data and Device management
International Communications Corporation
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
Enterprise Management Associates
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
SSISG
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
kkhhusshi
 
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsVisualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
CA Technologies
 
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Enterprise Management Associates
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
CA Technologies
 
Delivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent NetworkDelivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent Network
Benjamin Eggerstedt
 
WHGFeatures_BuyersGuide
WHGFeatures_BuyersGuideWHGFeatures_BuyersGuide
WHGFeatures_BuyersGuideEugene Yu
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
AWS Chicago
 
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
CA Technologies
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
Michel Burger
 

Similar to Inside the Cato Networks Management Console (20)

brocade-swisscom-ss
brocade-swisscom-ssbrocade-swisscom-ss
brocade-swisscom-ss
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
 
CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session  CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
 
Cscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerceCscc cloud-customer-architecture-for-e commerce
Cscc cloud-customer-architecture-for-e commerce
 
Software Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
Software Defined Networking/ Networking/ Traditional Networking/ SDN BenefitsSoftware Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
Software Defined Networking/ Networking/ Traditional Networking/ SDN Benefits
 
LD7007 Network Security.docx
LD7007 Network Security.docxLD7007 Network Security.docx
LD7007 Network Security.docx
 
ICC Data and Device management
ICC Data and Device managementICC Data and Device management
ICC Data and Device management
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsVisualizing Application & Delivery Flows to Make Data-Driven Decisions
Visualizing Application & Delivery Flows to Make Data-Driven Decisions
 
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
 
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
No More Dumb Pipes: An Enterprise Perspective for Evaluating Network Performa...
 
Delivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent NetworkDelivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent Network
 
WHGFeatures_BuyersGuide
WHGFeatures_BuyersGuideWHGFeatures_BuyersGuide
WHGFeatures_BuyersGuide
 
John Merline - How make your cloud SASE
John Merline - How make your cloud SASE John Merline - How make your cloud SASE
John Merline - How make your cloud SASE
 
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
No More Dumb Pipes: A Communications Service Provider Perspective for Evaluat...
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Inside the Cato Networks Management Console

  • 1. Global Backbone SD-WAN Firewall as a Service All in one Software-defined Perimeter Inside Cato Networks Management Platform 1 Cato Networks provides a converged, cloud-based networking and security platform connecting all of your corporate locations, cloud assets and mobile users. All network and security management is done through the Cato Management Application, a self-service console that provides a single view into the entire global network.
  • 2. Cato Management Application: Enterprise Network Overview 2 When you first come into the Cato Management Application you’re see an overview of your network. The main topology screen shows all sites, datacenters, and mobile users connected to the Cato Cloud. You can click any object to see more information and change configuration or policies. On your left side, are options to drill down into networking and security aspects of your implementation. On your right side, is a snapshot of the overall network performance. Let’s take a deeper look at some aspects of the Cato Management Application.
  • 4. Cato Management Application: WAN Firewall 4 The WAN Firewall is where you set access policies between the company different resources.
  • 5. Cato Management Application: WAN Firewall 5 Drilling down, you can see it allows you to segment the network and enable access based on user identities or location.
  • 6. Cato Management Application: Internet Firewall 6 All Internet-bound traffic is controlled by the Internet Firewall. It is fully identity- and application-aware so the admin can set specific access policies based on the users’ AD groups or roles.
  • 7. Cato Management Application: Internet Firewall 7 Drilling down, you can see it’s fully identity- and application-aware so the admin can set specific access policies based on the users’ AD groups or roles.
  • 9. Policy-Based Routing and Last-Mile Resilience 9 Once the traffic is classified, we dynamically route it based on real-time link quality….
  • 10. Policy-Based Routing and Last-Mile Resilience 10 Policy-based Routing Policy-based routing empowers the admin to decide per application which transport to use, it can be via Cato or another transport, like MPLS.
  • 11. Policy-Based Routing and Last-Mile Resilience 11 Cloud Optimization Route/NAT enables configuration of egress points via a specific Cato PoP. Cato accelerate business application access to physical or cloud datacenters by carrying designated traffic across the Cato Cloud network, dropping it right at the doorstep of the datacenter.
  • 12. Policy-Based Routing and Last-Mile Resilience 12 Acceleration Active TCP Acceleration enables Cato’s TCP Proxying capabilities to increase TCP throughput. Packet loss mitigation duplicates packet across multiple links to overcome the packet loss.
  • 13. Quality of Service Visibility 13 QoS Priorities The real-time analytics allows the admin the visibility to each link live performance, its ordered by the priorities configured by the admin.
  • 14. Quality of Service Visibility 14 QoS Priorities Each priority receives a MOS score based on the service level. Admins can click any priority for additional information about performance, on which transport, top applications, and the top hosts consuming bandwidth
  • 15. IDENTITY AWARENESS 15 Cato introduced identity-aware routing in July, 2018. Identity awareness abstracts policy creation from the network and application architecture, enabling business-centric routing policies based on user identity and group affiliation.
  • 16. Identity-Aware SD-WAN Policy ApplicationQoS Identity With identity awareness, traffic can be easily prioritized within an application 16
  • 17. Identity Awareness Is Also Integrated in the Reporting 17 The admin can monitor specific user activities for advanced troubleshooting and monitoring
  • 19. Network Analytics 19 Cato provides deep and robust network analytics metrics on all traffic per location. It gives the administrator a powerful tool to troubleshoot any aspect of the network.
  • 20. Network Analytics 20 Cato robust reporting for advanced troubleshooting Drilling down we can see a site with two internet links and its performance over time. Detailed information about throughput, packet loss, and jitter are available for advanced troubleshooting.
  • 21. Real-time Network Analytics 21 The real-time network analytics is another powerful tool that enables visibility to the site’s active links. The admin can see aggregated statistics or click any link for detailed information.
  • 22. Real-time Network Analytics 22 For example, by clicking WAN1, a real- time usage presented with details of the users and the applications using the link.

Editor's Notes

  1. Once again,