Connect with us

Hi, what are you looking for?


Endpoint Security

SASE Firm Cato Networks Revamps Managed Detection and Response Solution

Updated MDR solution continuously analyzes customer traffic for attributes that might disclose a threat

Updated MDR solution continuously analyzes customer traffic for attributes that might disclose a threat

Cato Networks has released its managed detection and response solution – MDR 2.0 – built on its Secure Access Service Edge (SASE) platform. SASE effectively removes (it doesn’t eliminate) security into the cloud. Ideal for distributed environments and remote working, it channels work traffic from source to destination via its own cloud platform, where security and visibility is applied.

During its passage across the platform, Cato Networks is able to analyze the traffic looking for anomalous behavior much as a traditional threat detection system does on a local network. The difference here is that it is one system analyzing many thousands of different traffic flows.

Cato Networks LogoIn what the firm describes as ‘legacy’ MDR systems, normal network behavior baselines must be established over time before genuine security anomalies can be detected. As a result, it can be anything from 30 to 90 days from implementation before the MDR becomes operationally valuable. Cato claims to have eliminated that delay by providing instant and automatic threat detection.

“We’ve developed a simply massive data warehouse storing the metadata for every IP address, session, and flow crossing the Cato global backbone,” explains David Greenfield, director of technology evangelism, in an associated blog. “We do that over time, so we can see the historical and current traffic patterns across thousands of enterprises and hundreds of thousands of remote users worldwide.”

This data warehouse is combined with Cato’s threat hunting system (CTHS). What the firm describes as multidimensional machine learning algorithms learn the difference between benign and malicious event indications, and the MDR applies this learning to continuously analyze customer traffic for the attributes that might disclose a threat.

The baseline is already developed from thousands of networks and becomes available to new MDR 2.0 customers from implementation. “This is what allows us to bring value to Cato MDR customers from day-1 of the service,” comments Elad Menahem, director of security. “We continue to collect network flows as an inherent part of Cato, refining those baselines and hunting for additional insight without any customer involvement.”

The development of a globally applicable normal behavior baseline is possible because Cato’s MDR is a single system looking at the entirety of the traffic flows. While it is more than possible for a specific event to be benign on one customer’s network but malicious on another, the Cato MDR sees the complete context of the event. “It is the context of the event that allows us to distinguish between benign and malign behavior,” Etay Maor, senior director security strategy, told SecurityWeek

This context can stretch over time. Because the traffic data is stored in an effectively limitless cloud data warehouse, MDR 2.0 can detect low and slow malicious beaconing to the same malicious IP, perhaps separated by a week or more and easily missed by many other systems.

Advertisement. Scroll to continue reading.

“What MDR does,” continued Maor, “is capitalize on our ability to provide deep network visibility without having our customers do any of the work. This is a zero-footprint service. For many other systems you must install things on the endpoint, manage the end points and collect the data. This leads to a prolonged setup period – which doesn’t happen here. If you’re a Cato customer, you are already connected to our backbone. You just say, ‘I want MDR’, and then, bang, you’ve got it – it’s on and working.”

But he added, “There’s another advantage with COVID-inspired remote working. Many of these new remote systems are not managed by the company security teams, who have little or no visibility into them. If an adversary gets into these remote systems, the attacker can easily close down whatever security it has, and potentially launch from there into the corporate network. That cannot happen with the Cato SASE because traffic from the remote device to the corporate network is always via the Cato backbone which detects security issues and blocks them.” Now, with MDR 2.0, customers can not only see and stop the issue, but can understand it – meaning that security teams now get visibility into the remote endpoint and can guide their user towards a solution.

Cato has augmented its MDR 2.0 service with a 70-point security checklist, and a designated security engineer for each customer. The security checklist automatically compares a customer’s security posture with the best practices implemented by the best enterprises. Items inspected include proper configuration of network segmentation, firewall rules, and security controls, like IPS and anti-malware. “Much of what we’re highlighting in our 70-point checklist is probably common sense to any security-minded professional. But all too often, those practices have not been found in one actionable resource,” says Menahem.

The designated security engineer (DSE) serves two primary purposes. Firstly, it is a confidence source for customers still learning to trust machine learning algorithms by providing a single source of contact for any concerns. Secondly, the DSE can enhance the system’s threat hunting queries for specific customers who have specific requirements – such as added protection for particularly valuable assets.

Related: Secure Access Service Edge Provider Cato Networks Raises $130 Million

Related: Report Highlights Massive Scale of Automated Cyberattacks

Related: Vendor Survey vs Reality on SASE Implementation

Related: Reinventing Managed Security Services’ Detection and Response

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.