This article provides an overview and use case of Cato's Endpoint Protection (EPP) solution.
Note: This is an Early Availability (EA) feature that is only available for limited release. For more information, contact your Cato Networks representative or send an email to email@example.com.
To prevent and detect attacks you need to implement security solutions across multiple areas across your attack surface. In addition to network security, Cato's Endpoint Protection (EPP) solution protects your endpoints to provide a centralized way to manage security. Potential threats are reported in the Cato Management Application. This data is combined with events across your network and lets you manage and respond from one platform. You can customize the protection levels that are used on your endpoints by creating policies. These can be applied to endusers or endpoints by adding them to a profile.
Company ABC uses Cato to protect its network and enforce its remote access policy. They are able to create strict rules for who can access their network and monitor activity. However, there is a gap in monitoring and responding to possible malicious events that take place on their endpoints. They have a third party EPP solution, but struggle to manage threats from both endpoints and their network due to an inability to combine the data.
The company implements Cato's EPP solution which provides them with the ability to create rules for access, network, security and endpoint security in a single platform. With Cato's EPP solution, from a single platform, they can monitor and respond in real time to potential malicious activity across their entire attack surface.
In the articles listed below we provide an explanation of how to install and configure Cato's EPP solution and monitor the threats that are identified by the EPP engines: