young company, we never compromise on security,” says Aviv. As a cloud-centric business that is subject to regulations and stores most of its data in SaaS applications and a IaaS datacenter, Blender specifically needs to secure data access. Solution When Aviv initially learned about Cato Networks and its cloud-based secure network, he saw it as a perfect fit for Blender. “The only metal I had in my office was our telephony machine and the firewall — and I wanted to get rid of both of them” explains Aviv. ”I felt that as much as we grow, the more these boxes would grow right along with us, as would the burden of managing and supporting them.” To deploy Cato, Blender simply replaced the incumbent firewall in the main office with a Cato Socket — a small, zero-touch, tunneling device to forward traffic from the office to the Cato Cloud. Connecting their branch offices was simple and required zero technical expertise. All locations were now using secure internet access via Cato. A full security stack, including Next- Gen Firewall, application control, and URL filtering inspects Blender’s traffic, which is fully encrypted between branches and the Cato Cloud. Managing network security centrally in the cloud enables a unified policy for all users, locations and applications. Prior to Cato, Aviv had planned to purchase more appliances to support the company’s disaster recovery (DR) sites. Installing Cato now allows him to avoid the significant expenses and IT resources it would take to manage additional appliances. Instead, his team is securely connecting the DR sites to the Cato Cloud and from there to the rest of the business. Blender employees access Office 365, Salesforce and Amazon AWS apps on-the-go using the Cato Client app on their mobile devices. The Cato Client establishes a secure tunnel to the Cato Cloud and all cloud traffic is protected by Cato. To prevent unauthorized access and protect against credential theft, Blender is using a unique Cato feature that allows them to configure their SaaS applications to accept traffic only from the Cato Cloud specific IP range. Since the Cato Client can only be used after a full device registration, hackers can’t target the cloud apps using unregistered devices. The Way Forward A year into production, Blender is meeting industry security audits while scaling capacity in step with its growing business and easily enabling users to access network resources using the cloud- based management application. Aviv has been impressed with the level of support he’s received throughout. Cato. Ready for Whatever’s Next Case Studies - Banking/Credit union & Financial Services 10
Cato Networks Case Study Financial Services Page 9 Page 11