Overview of Threat Protection

Overview of Threat Protection

The Cato Cloud contains Threat Protection engines that can inspect WAN and Internet traffic for malicious files and malware attacks. Traffic that is sent over MPLS or bypasses the Cato Cloud is not inspected by these engines. One Threat Prevention policy is applied to all sites in the account.


IMPORTANT! - We strongly recommend that you enable TLS inspection so that the Threat Protection services provide the maximum protection for your network.

Cato Networks Threat Protection Engines

These are the Threat Protection engines that inspect traffic in the Cato Cloud:

  • Anti-Malware - Protects against malicious files based on known file signatures and from a heuristic analysis

  • NG Anti-Malware - Protects against unknown and zero-day malicious files based on machine learning and predictive models

  • Intrusion Protection System (IPS) - Protects against known vulnerabilities, bots, and other malicious attacks

Was this article helpful?


  • Comment author
    Dwight Wilhelm

    LInks to the Overview of the Unified Anti-Malware Policy and Configuring the Unified Anti-Malware Policy are broken.

  • Comment author
    Yaakov Simon


    Thanks! Links are updated and fixed.


Add your comment