SlideShare a Scribd company logo
Global Backbone SD-WAN Firewall as a Service
All in one
The Future of SD-WAN
WAN Transformation in the Cloud and Mobile Era
Mark Bayne
Director, Sales Engineering, EMEA
$70,000,000
Cato Networks
2
CUSTOMERSCLOUD SCALEBUILT TO LAST
Gur Shatz, CTO
(Incapsula)
Shlomo Kramer, CEO
(Check Point, Imperva)
Global Network, 39 PoPs
Multi Tier-1
Providers
Optimized and Secure
Everywhere
24/7
Network Operations
Manufacturing
70% cost reduction
CatoMPLS
10 clouds, 700 mobile
105 stores
Technology
Retail
100s of customers
1000s of global locations
The WAN is Incompatible with Today’s Business Needs
3
Cloud, Mobility and Globalization drastically changing traffic patterns
Security
Appliances
Legacy
WAN
The WAN is Incompatible with Today’s Business Needs
4
Legacy tech blind spots
• MPLS: expensive and capacity constrained
• Site-to-site VPN: appliance sprawl
• Cloud and mobile: unmanaged and insecure access
HQ / Data Center Mobile UsersBranch
Unmanaged and
insecure connectivity
Unmanaged
connectivity
Branch
Capacity constrained
Internet backhaul
Managed connectivity
MPLS
Unmanaged connectivity,
appliance sprawl
The WAN is Incompatible with Today’s Business
5
Traditional SD-WAN offers a partial solution
HQ / Data Center
Unmanaged
connectivity
Unmanaged
connectivity
• SD-WAN: Cheap capacity, Still MPLS dependent
• Secure Branch: More security point solutions
• Cloud and mobile: Still unmanaged
Branch Branch Mobile Users
Unmanaged connectivity,
appliance sprawl
Managed connectivity
MPLS
SD-WAN
device
SD-WAN
device
Cheap capacity,
Unmanaged connectivity
More security point solutions
Cloud-
based
security
One Security
Zero maintenance, built-in network
security as a service
One Network
Affordable MPLS Alternative that
extends to all traffic
The Future of SD-WAN. Today.
6
HQ
Branch
Mobile Users
Cloud Data Center
Cato Cloud
One Policy
Unified management and enforcement
for all locations and users - everywhere
One Network
7
Global SD-WAN
CatoCloud
Routing Reliability Optimization Encryption
Network Overview PoPs Map Cato Socket
• Global, SLA-backed backbone
of Points of Presence (PoPs)
• Secure Tunnels Overlay
connects all resources to the
backbone
• MPLS Augmentation with core
SD-WAN capabilities
• MPLS Replacement
with SLA-backed backbone
• Connects Cloud Data Center
and Mobile Users to the WAN
(2) MPLS Replacement
SLA-backed Backbone
Branch
Cato
Socket
HQ
Cato
Client
Mobile Users
Agentless
Cloud Data Center
Network
Security
SD-WAN
(1) MPLS Augmentation or
Enhanced Internet WAN
Policy based routing,
Active/Active, FEC
MPLS
8
Cato Cloud PoPs Global Map
One Network
Next Generation
Firewall VPN
Secure Web
Gateway
Secure Cloud and
Mobile Access
Advanced Threat
Prevention
Network
Forensics
• Enterprise grade security
available everywhere
(local secure Internet exit)
• Elastic and agile: scale up,
seamlessly updated
• Cloud traffic visibility
accelerates defense
adaptation
• Appliance elimination in
remote locations and
datacenters
One Security
9
Built-in Network Security
CatoCloud
Routing Reliability Optimization Encryption
Branch
Cato
Socket
HQ
Cato
Client
Mobile Users
Agentless
Cloud Data Center
Network
Security
SD-WAN
MPLS
WAN & Internet Firewall Policy
One Policy
10
Unified Network and Security Policy
CatoCloud
Routing Reliability Optimization Encryption
Branch
Cato
Socket
HQ
Cato
Client
Mobile Users
Agentless
Cloud Data Center
SD-WAN
MPLS
• Unified policy across all
users, locations and access
to both internal and cloud
apps/data
• Managed service by Cato
and partners with full
enterprise IT supervision
Cato NOC/SOC,
MSP Partners,
Enterprise IT
Management
Next Generation
Firewall VPN
Secure Web
Gateway
Secure Cloud and
Mobile Access
Advanced Threat
Prevention
Network
Forensics
Network
Security
Next Generation
Firewall VPN
Secure Web
Gateway
Secure Cloud and
Mobile Access
Advanced Threat
Prevention
Network
Forensics
Convergence Drives Holistic WAN transformation
11
MPLS cost reduction, Appliance Elimination, Streamlined Operations
CatoCloud
Routing Reliability Optimization Encryption
Branch
Cato
Socket
HQ
Cato
Client
Mobile Users
Agentless
Cloud Data Center
SD-WAN
MPLS
Firewall as a Service3
Firewall
Appliances
4 CASB5 Remote Access6Edge
SD-WAN
2
Global MPLS1
Network
Security
Cato
6-in-1
Cato connects and protects all stores
without edge firewalls
• Eliminated or avoided deployment of edge firewalls
• Naturally extend to protect and optimize connectivity
for all regional franchise stores
Pet Lovers Center, Retail
12
Firewall Elimination/Avoidance, global WAN, 105 sites
Situation
• Retail firm, 65 locations in Singapore,
40 franchises in APAC
Drivers
• Store protection (IPS and Anti-malware)
• Datacenter connectivity
National FWaaS
(65)
International FWaaS,
MPLS Alternative
(105)
Case Studies Summary
AWS Data
Center
Firewall
Paysafe, Financial
13
Global WAN, Improve User Experience
Situation
• 19 locations: US, Canada,
Europe, India
• MPLS/VPN mix
• Multiple FW brands
Drivers
• Lack of global access to key
datacenter applications
• Complex VPN and security
environment
• High costs of MPLS and
firewalls
Cato provides secure global WAN
Phase 1:
• Move global WAN access to Cato Cloud
Phase 2:
• Secure direct internet access from all sites
MPLS
Branch
Branch
Firewall
Vendor A
HQ
VPN
Branch
Firewall
Vendor B
VPN
Case Studies Summary
Adroll, Technology
17
Transforms Global Access to Amazon
Situation
• Global firm: San Francisco, New York, Dublin, UK, Tokyo,
Sydney, India
• All employees VPN to HQ Firewall for AWS access
Drivers
• Improve WAN and Mobile access latency to AWS
Cato provides global optimized mobile access
to the cloud
• Connect mobile users globally to AWS via the Cato Cloud
• Optimized global access to AWS VPC without a “chokepoint”
Case Studies Summary
The Future of SD-WAN. Today.

More Related Content

What's hot

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudMaximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
VeloCloud Networks, Inc.
 
SD-WAN for Service Providers - VeloCloud
SD-WAN for Service Providers - VeloCloudSD-WAN for Service Providers - VeloCloud
SD-WAN for Service Providers - VeloCloud
VeloCloud Networks, Inc.
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
itnewsafrica
 
Presentation NetScaler SD-WAN
Presentation NetScaler SD-WANPresentation NetScaler SD-WAN
Presentation NetScaler SD-WAN
Michelle Guerrero Montalvo
 
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdfQuantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
MiguelFernandoBarrio
 
SD WAN
SD WANSD WAN
SD WAN
Bri Molina
 
SD-WAN
SD-WANSD-WAN
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
ThousandEyes
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
Cisco Canada
 
SD-WAN PROTOCOLS
SD-WAN PROTOCOLSSD-WAN PROTOCOLS
SD-WAN PROTOCOLS
bilal anjum
 
China Telecom Americas: SD-WAN Overview
China Telecom Americas:  SD-WAN OverviewChina Telecom Americas:  SD-WAN Overview
China Telecom Americas: SD-WAN Overview
Vlad Sinayuk
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
Inside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleInside the Cato Networks Management Console
Inside the Cato Networks Management Console
David Greenfield
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
MehtabRohela
 
Why sdn
Why sdnWhy sdn
Why sdn
lz1dsb
 
Introduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management SolutionIntroduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management Solution
Tien Nguyen Duc
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever created
Ronald Bartels
 

What's hot (20)

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudMaximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
 
SD-WAN for Service Providers - VeloCloud
SD-WAN for Service Providers - VeloCloudSD-WAN for Service Providers - VeloCloud
SD-WAN for Service Providers - VeloCloud
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
 
Presentation NetScaler SD-WAN
Presentation NetScaler SD-WANPresentation NetScaler SD-WAN
Presentation NetScaler SD-WAN
 
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdfQuantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
 
SD WAN
SD WANSD WAN
SD WAN
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
SD-WAN PROTOCOLS
SD-WAN PROTOCOLSSD-WAN PROTOCOLS
SD-WAN PROTOCOLS
 
China Telecom Americas: SD-WAN Overview
China Telecom Americas:  SD-WAN OverviewChina Telecom Americas:  SD-WAN Overview
China Telecom Americas: SD-WAN Overview
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Inside the Cato Networks Management Console
Inside the Cato Networks Management ConsoleInside the Cato Networks Management Console
Inside the Cato Networks Management Console
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
 
Why sdn
Why sdnWhy sdn
Why sdn
 
Introduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management SolutionIntroduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management Solution
 
The greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever createdThe greatest SDWAN sales slidedeck ever created
The greatest SDWAN sales slidedeck ever created
 

Similar to The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era

Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
SWITCHPOINT NV/SA
 
Level 3 Hybrid WAN/SDN Defined
Level 3 Hybrid WAN/SDN DefinedLevel 3 Hybrid WAN/SDN Defined
Level 3 Hybrid WAN/SDN Defined
Scott Burns
 
Level 3 hybrid wan
Level 3 hybrid wanLevel 3 hybrid wan
Level 3 hybrid wan
Scott Burns
 
Level 3 hybrid wan
Level 3 hybrid wan Level 3 hybrid wan
Level 3 hybrid wan
Scott Burns
 
Mellanox Market Leading Solutions
Mellanox Market Leading SolutionsMellanox Market Leading Solutions
Mellanox Market Leading Solutions
Mellanox Technologies
 
The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44
Jisc
 
How Alcatel-Lucent Enterprise Makes Universities State-of-the-Art
How Alcatel-Lucent Enterprise Makes Universities State-of-the-ArtHow Alcatel-Lucent Enterprise Makes Universities State-of-the-Art
How Alcatel-Lucent Enterprise Makes Universities State-of-the-Art
Alcatel-Lucent Enterprise
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld
 
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
128 Technology
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
LumosNetworks
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
Lumos Networks
 
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter NetworkIntelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
QOS Networks
 
Wlan 802 11ac_battle_card
Wlan 802 11ac_battle_cardWlan 802 11ac_battle_card
Wlan 802 11ac_battle_card
Advantec Distribution
 
New Branch IT Opportunities: Enhanced Performance & Reduced Costs
New Branch IT Opportunities: Enhanced Performance & Reduced CostsNew Branch IT Opportunities: Enhanced Performance & Reduced Costs
New Branch IT Opportunities: Enhanced Performance & Reduced Costs
Aruba, a Hewlett Packard Enterprise company
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
Tata Tele Business Services
 
Huawei IP Network Products Sales Specialist Training(HCSA) - revised.pptx
Huawei IP Network Products Sales Specialist Training(HCSA) - revised.pptxHuawei IP Network Products Sales Specialist Training(HCSA) - revised.pptx
Huawei IP Network Products Sales Specialist Training(HCSA) - revised.pptx
Adeniyi Bakare
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
Rowell Dionicio
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
Naved Ahmed
 
CloudGenix_Customer Presentation
CloudGenix_Customer PresentationCloudGenix_Customer Presentation
CloudGenix_Customer Presentation
Syed Arsalan
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
Cisco Canada
 

Similar to The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era (20)

Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
Silver Peak presentation used during the SWITCHPOINT NV/SA Quarterly Experien...
 
Level 3 Hybrid WAN/SDN Defined
Level 3 Hybrid WAN/SDN DefinedLevel 3 Hybrid WAN/SDN Defined
Level 3 Hybrid WAN/SDN Defined
 
Level 3 hybrid wan
Level 3 hybrid wanLevel 3 hybrid wan
Level 3 hybrid wan
 
Level 3 hybrid wan
Level 3 hybrid wan Level 3 hybrid wan
Level 3 hybrid wan
 
Mellanox Market Leading Solutions
Mellanox Market Leading SolutionsMellanox Market Leading Solutions
Mellanox Market Leading Solutions
 
The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44The simplification of the campus network Juniper - Networkshop44
The simplification of the campus network Juniper - Networkshop44
 
How Alcatel-Lucent Enterprise Makes Universities State-of-the-Art
How Alcatel-Lucent Enterprise Makes Universities State-of-the-ArtHow Alcatel-Lucent Enterprise Makes Universities State-of-the-Art
How Alcatel-Lucent Enterprise Makes Universities State-of-the-Art
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
128 Technology Webinar - Remove Overhead and Complexity with Tunnel-Free SD-WAN
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter NetworkIntelligence at the Edge: How SD-WAN can Enable a Smarter Network
Intelligence at the Edge: How SD-WAN can Enable a Smarter Network
 
Wlan 802 11ac_battle_card
Wlan 802 11ac_battle_cardWlan 802 11ac_battle_card
Wlan 802 11ac_battle_card
 
New Branch IT Opportunities: Enhanced Performance & Reduced Costs
New Branch IT Opportunities: Enhanced Performance & Reduced CostsNew Branch IT Opportunities: Enhanced Performance & Reduced Costs
New Branch IT Opportunities: Enhanced Performance & Reduced Costs
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
 
Huawei IP Network Products Sales Specialist Training(HCSA) - revised.pptx
Huawei IP Network Products Sales Specialist Training(HCSA) - revised.pptxHuawei IP Network Products Sales Specialist Training(HCSA) - revised.pptx
Huawei IP Network Products Sales Specialist Training(HCSA) - revised.pptx
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
CloudGenix_Customer Presentation
CloudGenix_Customer PresentationCloudGenix_Customer Presentation
CloudGenix_Customer Presentation
 
DNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus DayDNA Intelligent WAN Campus Day
DNA Intelligent WAN Campus Day
 

More from Digital Transformation EXPO Event Series

Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketingWho’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Digital Transformation EXPO Event Series
 
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Digital Transformation EXPO Event Series
 
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Digital Transformation EXPO Event Series
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
Digital Transformation EXPO Event Series
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Digital Transformation EXPO Event Series
 
A modern approach to cloud computing
A modern approach to cloud computing A modern approach to cloud computing
A modern approach to cloud computing
Digital Transformation EXPO Event Series
 
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Digital Transformation EXPO Event Series
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
Digital Transformation EXPO Event Series
 
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Digital Transformation EXPO Event Series
 
Lean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science teamLean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science team
Digital Transformation EXPO Event Series
 
Top 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real WorldTop 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real World
Digital Transformation EXPO Event Series
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Digital Transformation EXPO Event Series
 
Data Science Is More Than Just Statistics
Data Science Is More Than Just StatisticsData Science Is More Than Just Statistics
Data Science Is More Than Just Statistics
Digital Transformation EXPO Event Series
 
Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform
Digital Transformation EXPO Event Series
 
The convergence of Data Science and Software Development
The convergence of Data Science and Software DevelopmentThe convergence of Data Science and Software Development
The convergence of Data Science and Software Development
Digital Transformation EXPO Event Series
 
The future impact of AI in cybercrime
The future impact of AI in cybercrimeThe future impact of AI in cybercrime
The future impact of AI in cybercrime
Digital Transformation EXPO Event Series
 
Digital Innovation in Medical Gases
Digital Innovation in Medical GasesDigital Innovation in Medical Gases
Digital Innovation in Medical Gases
Digital Transformation EXPO Event Series
 
AI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industryAI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industry
Digital Transformation EXPO Event Series
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Digital Transformation EXPO Event Series
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
Digital Transformation EXPO Event Series
 

More from Digital Transformation EXPO Event Series (20)

Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketingWho’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
 
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
 
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
A modern approach to cloud computing
A modern approach to cloud computing A modern approach to cloud computing
A modern approach to cloud computing
 
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learning
 
Lean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science teamLean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science team
 
Top 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real WorldTop 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real World
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
 
Data Science Is More Than Just Statistics
Data Science Is More Than Just StatisticsData Science Is More Than Just Statistics
Data Science Is More Than Just Statistics
 
Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform
 
The convergence of Data Science and Software Development
The convergence of Data Science and Software DevelopmentThe convergence of Data Science and Software Development
The convergence of Data Science and Software Development
 
The future impact of AI in cybercrime
The future impact of AI in cybercrimeThe future impact of AI in cybercrime
The future impact of AI in cybercrime
 
Digital Innovation in Medical Gases
Digital Innovation in Medical GasesDigital Innovation in Medical Gases
Digital Innovation in Medical Gases
 
AI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industryAI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industry
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era

  • 1. Global Backbone SD-WAN Firewall as a Service All in one The Future of SD-WAN WAN Transformation in the Cloud and Mobile Era Mark Bayne Director, Sales Engineering, EMEA
  • 2. $70,000,000 Cato Networks 2 CUSTOMERSCLOUD SCALEBUILT TO LAST Gur Shatz, CTO (Incapsula) Shlomo Kramer, CEO (Check Point, Imperva) Global Network, 39 PoPs Multi Tier-1 Providers Optimized and Secure Everywhere 24/7 Network Operations Manufacturing 70% cost reduction CatoMPLS 10 clouds, 700 mobile 105 stores Technology Retail 100s of customers 1000s of global locations
  • 3. The WAN is Incompatible with Today’s Business Needs 3 Cloud, Mobility and Globalization drastically changing traffic patterns Security Appliances Legacy WAN
  • 4. The WAN is Incompatible with Today’s Business Needs 4 Legacy tech blind spots • MPLS: expensive and capacity constrained • Site-to-site VPN: appliance sprawl • Cloud and mobile: unmanaged and insecure access HQ / Data Center Mobile UsersBranch Unmanaged and insecure connectivity Unmanaged connectivity Branch Capacity constrained Internet backhaul Managed connectivity MPLS Unmanaged connectivity, appliance sprawl
  • 5. The WAN is Incompatible with Today’s Business 5 Traditional SD-WAN offers a partial solution HQ / Data Center Unmanaged connectivity Unmanaged connectivity • SD-WAN: Cheap capacity, Still MPLS dependent • Secure Branch: More security point solutions • Cloud and mobile: Still unmanaged Branch Branch Mobile Users Unmanaged connectivity, appliance sprawl Managed connectivity MPLS SD-WAN device SD-WAN device Cheap capacity, Unmanaged connectivity More security point solutions Cloud- based security
  • 6. One Security Zero maintenance, built-in network security as a service One Network Affordable MPLS Alternative that extends to all traffic The Future of SD-WAN. Today. 6 HQ Branch Mobile Users Cloud Data Center Cato Cloud One Policy Unified management and enforcement for all locations and users - everywhere
  • 7. One Network 7 Global SD-WAN CatoCloud Routing Reliability Optimization Encryption Network Overview PoPs Map Cato Socket • Global, SLA-backed backbone of Points of Presence (PoPs) • Secure Tunnels Overlay connects all resources to the backbone • MPLS Augmentation with core SD-WAN capabilities • MPLS Replacement with SLA-backed backbone • Connects Cloud Data Center and Mobile Users to the WAN (2) MPLS Replacement SLA-backed Backbone Branch Cato Socket HQ Cato Client Mobile Users Agentless Cloud Data Center Network Security SD-WAN (1) MPLS Augmentation or Enhanced Internet WAN Policy based routing, Active/Active, FEC MPLS
  • 8. 8 Cato Cloud PoPs Global Map One Network
  • 9. Next Generation Firewall VPN Secure Web Gateway Secure Cloud and Mobile Access Advanced Threat Prevention Network Forensics • Enterprise grade security available everywhere (local secure Internet exit) • Elastic and agile: scale up, seamlessly updated • Cloud traffic visibility accelerates defense adaptation • Appliance elimination in remote locations and datacenters One Security 9 Built-in Network Security CatoCloud Routing Reliability Optimization Encryption Branch Cato Socket HQ Cato Client Mobile Users Agentless Cloud Data Center Network Security SD-WAN MPLS WAN & Internet Firewall Policy
  • 10. One Policy 10 Unified Network and Security Policy CatoCloud Routing Reliability Optimization Encryption Branch Cato Socket HQ Cato Client Mobile Users Agentless Cloud Data Center SD-WAN MPLS • Unified policy across all users, locations and access to both internal and cloud apps/data • Managed service by Cato and partners with full enterprise IT supervision Cato NOC/SOC, MSP Partners, Enterprise IT Management Next Generation Firewall VPN Secure Web Gateway Secure Cloud and Mobile Access Advanced Threat Prevention Network Forensics Network Security
  • 11. Next Generation Firewall VPN Secure Web Gateway Secure Cloud and Mobile Access Advanced Threat Prevention Network Forensics Convergence Drives Holistic WAN transformation 11 MPLS cost reduction, Appliance Elimination, Streamlined Operations CatoCloud Routing Reliability Optimization Encryption Branch Cato Socket HQ Cato Client Mobile Users Agentless Cloud Data Center SD-WAN MPLS Firewall as a Service3 Firewall Appliances 4 CASB5 Remote Access6Edge SD-WAN 2 Global MPLS1 Network Security Cato 6-in-1
  • 12. Cato connects and protects all stores without edge firewalls • Eliminated or avoided deployment of edge firewalls • Naturally extend to protect and optimize connectivity for all regional franchise stores Pet Lovers Center, Retail 12 Firewall Elimination/Avoidance, global WAN, 105 sites Situation • Retail firm, 65 locations in Singapore, 40 franchises in APAC Drivers • Store protection (IPS and Anti-malware) • Datacenter connectivity National FWaaS (65) International FWaaS, MPLS Alternative (105) Case Studies Summary
  • 13. AWS Data Center Firewall Paysafe, Financial 13 Global WAN, Improve User Experience Situation • 19 locations: US, Canada, Europe, India • MPLS/VPN mix • Multiple FW brands Drivers • Lack of global access to key datacenter applications • Complex VPN and security environment • High costs of MPLS and firewalls Cato provides secure global WAN Phase 1: • Move global WAN access to Cato Cloud Phase 2: • Secure direct internet access from all sites MPLS Branch Branch Firewall Vendor A HQ VPN Branch Firewall Vendor B VPN Case Studies Summary
  • 14. Adroll, Technology 17 Transforms Global Access to Amazon Situation • Global firm: San Francisco, New York, Dublin, UK, Tokyo, Sydney, India • All employees VPN to HQ Firewall for AWS access Drivers • Improve WAN and Mobile access latency to AWS Cato provides global optimized mobile access to the cloud • Connect mobile users globally to AWS via the Cato Cloud • Optimized global access to AWS VPC without a “chokepoint” Case Studies Summary
  • 15. The Future of SD-WAN. Today.