![]() Security – features supported by the application such as if it supports TLS or Two-Factor authentication, SSO, etc. General – what the company does, employees, where it’s headquartered, etc.Ĭompliance – certifications the application holds and complies with. To manage sanctioned/unsanctioned applications, apply security policies across the network based on the application or category of applications, and especially for granular application controls using CASB, a comprehensive application catalog must be maintained.Īt Cato, keeping up required building a process that is both highly automated and just as importantly, data-driven, so that we focus on the applications most in-use by our customers and be able to separate the wheat from the chaff.In this post we’ll detail how we supercharged our application catalog updates from a labor-intensive manual process to an AI/ML based process that is fully automated in the form of a data-driven pipeline, growing our rate of adding new application by an order of magnitude, from tens of application to hundreds added every week.Įvery application in our Application Catalog has several characteristics: Organizations must keep up by using tools that are automatically updated with latest developments and changes in the applications landscape to maintain proper security.Īn integral part of any SASE product is its ability to accurately categorize and map user traffic to the actual application being used. Cato Application Catalog – How we supercharged application categorization with AI/ML New applications emerge at an almost impossible to keep-up-with pace, creating a constant challenge and blind spot for IT and security teams in the form of Shadow IT.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |