Cato SASE Cloud Platform vs Vectra AI comparison

Cancel
You must select at least 2 products to compare!
Lookout Logo
345 views|279 comparisons
71% willing to recommend
Cato Networks Logo
6,815 views|3,792 comparisons
100% willing to recommend
Vectra AI Logo
7,438 views|3,458 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cato SASE Cloud Platform and Vectra AI based on real PeerSpot user reviews.

Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Secure Access Service Edge (SASE).
To learn more, read our detailed Secure Access Service Edge (SASE) Report (Updated: March 2024).
767,847 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator.""The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade.""The solution is stable.""The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."

More Lookout Pros →

"The feature that I find to be the most valuable is the bandwidth aggregation.""The product is efficient and easy to use.""The most valuable features of Cato Networks are the always-on VPN for remote workers and centralized management. Additionally, web filtering and antivirus are good.""It is a stable solution...it is a scalable solution.""The query and the SD-WAN are useful features of the solution.""What I found most helpful in Cato Networks is that it works out of the box. One of its main advantages is that it's a simple product to deploy. You subscribe, and you're ready to run.""The most valuable feature of Cato Networks is the CASB and the documentation is useful.""The scalability is quite good."

More Cato SASE Cloud Platform Pros →

"Some valuable features of Vectra AI are that it is very intuitive and that there are only a small amount of false positives. Therefore, it's an effective solution.""The most valuable feature for Cognito Detect, the main solution, is that external IDS's create a lot of alerts. When I say a lot of alerts I really mean a lot of alerts. Vectra, on the other hand, contextualizes everything, reducing the number of alerts and pinpointing only the things of interest. This is a key feature for me. Because of this, a non-trained analyst can use it almost right away.""Vectra AI can bring the ability to detect intrusion on the network more so than legacy IDS tools.""It does a reliable job of parsing out the logs of all the network traffic so that we can ingest them into our SIEM and utilize them for threat hunting and case investigations. It is pretty robust and reliable. The administration time that we spend maintaining it or troubleshooting it is very low. So, the labor hour overhead is probably our largest benefit from it. We spend 99% of our time in Vectra investigating cases, responding to incidents, or hunting, and only around 1% of our time is spent patching, troubleshooting, or doing anything else. That's our largest benefit from Vectra.""What I like best about Vectra AI is that it alerts you about suspicious activities.""Vectra AI helped our team be more productive and save time. We have less work thanks to it.""Scalability wise, we have many sensors, and Vectra AI seems to handle them all very well.""One of the core features is that Vectra AI triages threats and correlates them with compromised host devices. From a visibility perspective, we can better track the threat across the network. Instead of us potentially finding one device that has been impacted without Vectra AI, it will give us the visibility of everywhere that threat went. Therefore, visibility has increased for us."

More Vectra AI Pros →

Cons
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving.""From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products.""The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer""We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."

More Lookout Cons →

"Modifying or incorporating Cato Network to work with a third-party platform, such as Microsoft, or other Software-as-a-Service (SaaS) offerings would be beneficial. Having more integration partners would help the users implement the solution.""I am located in South Korea, and I can say that most people here have no idea about Cato Networks. I think Cato Networks should promote its network services in various countries.""The product may be complex for users with few years of experience.""We would like the product to continue to improve its security.""Web application firewalling (WAF) is a feature we would like to have in this solution and does not exist yet.""The tool needs to be more granular. Its reports are not very in-depth.""The product must evolve into the endpoint domain.""Its functionality is a bit limited in some areas as compared to a Cisco solution. It is not as granular. It doesn't have the manageability, feature set, and capabilities of a larger or an enterprise-level solution. It just needs a more robust feature set and granularity."

More Cato SASE Cloud Platform Cons →

"Vectra is still limited to packet management. It's only monitoring packet exchanges. While it can see a lot of things, it can't see everything, depending on where it's deployed. It has its limits and that's why I still have my SIEM.""In comparison with a lot of systems I used in the past, the false positives are really a burden because they are taking a lot of time at this moment.""Some of the customization could be improved. Everything is provided for you as an easy solution to use, but working with it and doing specific development could be worked on a bit more in the scope of an incident response team.""The main improvement I can see would be to integrate with more external solutions.""We have a lot of system solutions and integrations with system solutions. Vectra is a type of black box. It implements AI-informed detection mechanisms, but we cannot create system detections. I understand that the product is designed this way, but it would be great if we could create our own detections as well.""The reporting from Cognito Detect is very limited and doesn't give you too many options. If I want to prepare a customized report on a particular host, even though I see the data, I have to manually prepare the report. The reporting features that are built into the tool are not very helpful.""Vectra Recall could be utilized much more, and I'm seeing some indications of that today with the investigative components. I use the Visualize feature to visualize components and dashboards a lot. I'm interested in new ways to build automated searches or having them leveraged already from Vectra.""One thing which I have found where there could be improvement is with regard to the architecture, a little bit: how the brains and sensors function. It needs more flexibility with regard to the brain. If there were some flexibility in that regard, that would be helpful, because changing the mode of the brain is complex. In some cases, the change is permanent. You cannot revert it."

More Vectra AI Cons →

Pricing and Cost Advice
  • "The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."
  • "Lookout is definitely on the lower end when it comes to price point and that seems to be the only differentiator. The technology is in place in this space and it's really about who is coming in at the better price point now."
  • "In terms of feature performance versus cost, they're a good value."
  • "The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For example, Lookout costs 2/3rd of Prisma's licensing price."
  • More Lookout Pricing and Cost Advice →

  • "The price is not an issue for us, as it is priced more competitively than some other vendors."
  • "If you compare with VeloCloud, the price is the same or even cheaper."
  • "You pay yearly based on the speed of your network. If you increase the speed of your network, you increase the cost for your throughput. It is by bandwidth for the most part and then licenses for VPN. There is some per-seat licensing for VPN access, but the majority of it is minimal. It is like $30 a year per client. The rest is based on how much bandwidth you'll use. You pay for that upfront for the year, and if you have to increase it, you increase it, and then they let you send more data through. There are no additional costs in addition to the standard licensing fees."
  • "Cato Networks seems more expensive than Cisco Meraki."
  • "The pricing of this solution depends on what you need. It is based on bandwidth."
  • "I rate the price of Cato Networks a four out of five."
  • "Cato Networks is an expensive product, but it works out of the box, so that's the usual trade-off, make versus buy. If you decide to buy a product that doesn't require much programming, then you'd want to go for Cato Networks, which will work naturally, and immediately without any complex setup. However, the product is a little bit more expensive than the competitors. On a scale of one to five, I'd rate the pricing for Cato Networks as four."
  • "The product is very competitively priced, and that's compelling. They don't charge the customer based on the operational cost like other brands such as Palo Alto. Cato has its own fully-fledged cloud, with their own data centers, equipment, and so on, which is an advantage. I rate the solution five out of five for affordability."
  • More Cato SASE Cloud Platform Pricing and Cost Advice →

  • "We are running at about 90,000 pounds per year. The solution is a licensed cost. The hardware that they gave us was pretty much next to nothing. It is the license that we're paying for."
  • "The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses."
  • "There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream."
  • "We have a desire to increase our use. However, it all comes down to budget. It's a very expensive tool that is very difficult to prove business support for. We would like to have two separate networks. We have our corporate network and PCI network, which is segregated due to payment processing. We don't have it for deployed in the PCI network. It would be good to have it fully deployed there to provide us with additional monitoring and control, but the cost associated with their licensing model makes it prohibitively expensive to deploy."
  • "At the time of purchase, we found the pricing acceptable. We had an urgency to get something in place because we had a minor breach that occurred at the tail end of 2016 to the beginning of 2017. This indicated we had a lack of ability to detect things on the network. Hence, why we moved quickly to get into the tool in place. We found things like Bitcoin mining and botnets which we closed quickly. In that regard, it was worth the money."
  • "The pricing is very good. It's less expensive than many of the tools out there."
  • "The pricing is high."
  • "Their licensing model is antiquated. I'm not a fan of their licensing model. We have to pay for licensing based on four different things. You have to pay based on the number of unique IPs, the number of logs that we send through Recall and Stream, and the size of our environment. They need to simplify their licensing down to just one thing. It should be based on the amount of data, the number of devices, or something else, but there should be just one thing for everything. That's what they need to base their licensing on. Cost-wise, they're not cheap. They were definitely the most expensive option, but you get what you pay for. They're not the cheapest option."
  • More Vectra AI Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Secure Access Service Edge (SASE) solutions are best for your needs.
    767,847 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For… more »
    Top Answer:The solution could improve identity integration as well. Zero trust, it's a good start as a zero-trust solution… more »
    Top Answer:The solution is a simple WAN solution. We've onboarded the socket on the Cato platform, and it provides connectivity… more »
    Top Answer:We use the solution as a WAN, but we plan to optimize it by incorporating security features like zero trust for enhanced… more »
    Top Answer:In terms of security, we are planning to deploy more features and our current usage is primarily focused on branch… more »
    Top Answer:The two platforms take a fundamentally different approach to NDR. Corelight is limited to use cases that require the… more »
    Top Answer:Vectra AI generates relevant information.
    Top Answer:It's relatively on the pricier side, but when compared to other solutions. It's not the most budget-friendly option, but… more »
    Comparisons
    Also Known As
    CipherCloud
    Cato Networks
    Vectra Networks, Vectra AI NDR
    Learn More
    Overview

    Lookout is a well-established and powerful secure web gateway (SWG) solution that protects more than 200 million users from threats that can result from the penetration of unsecured web traffic into their networks. Lookout is designed to enable organizations to work remotely while maintaining a tight blanket of security over their confidential business data. It provides administrators with security that extends from their endpoints to the cloud service that they are using to run their organization’s network. 

    Users of Lookout are able to proactively detect threats and keep themselves secure from a field of threats that constantly evolves. IT teams can protect their organizations without having to rely on any other security solutions. This singular solution can run on multiple kinds of mobile devices. The privacy of individuals is preserved while keeping compliance rules intact. Additionally, users gain access to a number of tools that enable them to prevent security breaches from taking place.

    Lookout Benefits

    Some of the ways that organizations can benefit by deploying Lookout include:

    • Ease of deployment. Lookout is a solution whose design makes it easy for users to deploy it. It provides users with simple, step-by-step instructions that remove the need for organizations to devote extensive amounts of time to make sure that it is properly set up. Anyone can quickly set up the solution without undergoing technical training. 
    • Built-in support. Users of the Lookout application have access to built-in demos that can teach them how to use various solution features. Instead of spending time trying to figure out the application, users can watch the demo that is most relevant to them and see for themselves how that particular feature is used.
    • Easy-to-use user interface. Lookout’s user interface is laid out in an intuitive way that makes it easy for administrators to navigate. This interface is present in both the mobile and desktop versions of this solution. 
    • Settings customization. Lookout has a built-in settings customization menu. This makes it possible for administrators to easily customize their settings so that they best conform to their needs. 

    Lookout Features

    • Activity monitoring and activity tracking. Lookout’s activity monitoring and activity tracking capabilities enable users to keep a close eye on the activities that are taking place in their networks. IT teams and administrators have the ability to watch their networks for any unusual activity. These features ensure that organizations can keep ahead of any potential threats. They provide the kinds of insights and warnings that make the jobs of those IT teams and administrators much easier and more streamlined. 
    • Encryption. Organizations that employ Lookout can encrypt their networks and keep crucial business data from being read by unauthorized parties. This feature keeps the secrets organizations are trying to keep out of the wrong hands.
    • Anti-virus tools. Lookout provides users with tools to block threats from harming their networks. These tools can successfully block 99.6 percent of threats without raising false alarms. 

    Cato Networks is a leading SASE (Secure Access Service Edge) platform, combining SD-WAN and network security to obtain a cloud-native service. Cato Networks optimizes and secures application access for users and identities. The platform delivers a next-generation secure networking architecture that minimizes legacy IT infrastructures’ complexity, costs, and risks. The goal of Cato Suite is to connect any user to any application securely and optimally.

    Cato Suite runs on a private global network of more than 65 PoPs (points of presence) connected via SLA-backed network providers. The service can connect branches, data centers, users, and clouds. Cato can be deployed in stages to augment legacy network services.

    Cato Suite delivers end-to-end route optimization for WAN and cloud traffic. The architecture is self-healing, enabling a high service uptime.

    Cato Features

    Cato Cloud has a global backbone to deliver a reliable, global network. Here are some key SD-WAN features of Cato Cloud.

    • Optimizes traffic flows: The Cato Suite can individually optimize traffic flows in the last mile - from the customer’s location to the point of presence, and also between PoPs. This feature eliminates the need for internet providers to hand off traffic to each other, avoiding the resulting latency and congestion.
    • Controls and manages bandwidth: The software-defined overlay is encrypted across the entire cloud infrastructure. This overlay uses application-aware routing, analyzing latency and loss data to choose the best route according to network conditions. These features, like protocol priority marking, enable the system to ensure the performance of real-time applications.
    • Delivers redundancy and failover: By connecting the points of presence with multiple Tier-1 IPs, Cato builds the redundancy needed to ensure security and highly available service.
    • Cloud-native: Cato is built as a scalable, resilient, and elastic cloud service.
    • Converged: The platform converges SD-WAN and network security into a single infrastructure framework.
    • Secures all edges: Cato Network can secure and optimize traffic from all users, locations, applications, and clouds.

    What challenges does Cato Network solve?

    • Migration to SD-WAN

    MPLS (multi-protocol label switching) networks are usually expensive and limited in their capacity. Cato simplifies migrating to a faster, higher-capacity internet and SASE cloud. Cato SD-WAN appliances enable customers to improve usable capacity and resiliency.

    • Global connectivity optimization

    Customers who suffer from the challenge of high latency and network inconsistency can use Cato to deliver a consistent connection and user experience to access on-premises and cloud applications.

    • Securing branch internet access

    Cato’s complete network security stack connects all branch locations to the Cato cloud, therefore protecting all traffic, both internet-bound and WAN, with enterprise-grade, cloud-based security services. This capability avoids having to backhaul internet traffic to a data center or hub or having to implement stand-alone cloud security solutions.

    • Cloud acceleration and control

    Organizations using Cato notice an acceleration of cloud traffic. Cato achieves this by routing all traffic from the edges to the PoP closest to the data center. Because of the close distance between the two, the latency is near zero.

    Reviews from Real Users

    An IT manager/project coordinator at a healthcare company says that “[Cato is] a cloud-based solution that integrates well with everything. They are the classic SaaS solution.”

    Yeong-Gi L., a network engineer at Snetsystems, notes that “The solution is very stable. The scalability is quite good. Technical support was always helpful and responsive. The integration capabilities are not a problem at all.”

    "The most valuable feature is that it also works as a next-gen firewall because it has security features," says Lorenzo S., senior solutions consultant Lead at MDI.

    Vectra threat detection and response is a complete cybersecurity platform that collects, detects, and prioritizes security alerts. The Cognito platform for Network Detection and Response (NDR) detects and responds to attacks inside cloud, data center, Internet of Things, and enterprise networks. The platform also provides automated response capabilities for low-level threats and escalates more severe anomalies to security personnel.

    Cognito captures data for multiple relevant sources and enriches it with context and security insights. It starts by deploying sensors across different networks in datacenters, IoT, or enterprise networks. The algorithm extracts relevant metadata from network and cloud traffic. The information can also be non-security information that can help investigation. 

    The data is enriched with security context to support critical use cases, such as threat detection, investigation, hunting and compliance. The platform is machine learning-based, which enables it to adapt to any new and current threat scenario. It detects, clusters, prioritizes, and anticipates attacks by using identity and host-level enforcement. 

    With the Vectra platform, a person can investigate 50 threats in just two hours. By prioritizing alerts and leveraging threat intelligence, it provides faster results.Vectra solves today’s security challenges for network detection and response. 

    One of Vectra’s best features is the emphasis they put in pairing research and data science for security insights. It offers behavior codification with unsupervised, supervised, and deep learning models. 

    The pricing is according to a subscription model with a free trial available.Vectra is available for Office 365, Azure AD and AWS Brain.

    Features of Vectra AI

    • AI-based threat detection and response. 
    • Detects attacks in real time with behavior-based threat detection. 
    • Consolidates and correlates thousands of events, detecting threats. 
    • Enriches threat investigation with a chain of evidence and data science security insights. 
    • Machine learning techniques, including deep learning and neural networks. 
    • Gives visibility into cyberattackers and analyzes all network traffic. 
    • Continuous updates with new threat detection algorithms. 
    • Provides encryption at rest and in transit. For the AWS version, it offers AES-256 encryption via AWS Key Management Service. 
    • Guaranteed availability according to the SLA of the service selected. 
    • Does not connect to public sector networks. 

    Benefits of Vectra AI

    • Behavioral models use AI to find unknown attackers. 
    • Context increases the accuracy of threat hunting. 
    • Allows for proactive action by prioritizing the most relevant information. 
    • Provides a clear picture and extensive context for investigations. 
    • Aids decision-making in the incident response process. 
    • Helps working with large datasets by capturing metadata at scale. 
    • Automates time-consuming analysis. 
    • Reduces the security analysts’ workloads on threat investigations. 

    Other advantages of Vectra services include that they can be deployed in the public, private, or hybrid cloud. Support is available via email or online ticketing with an average of 4 hours of response. Phone support is available 24/7. 

    Vectra provides full on-site and online training and documentation. Regarding the user interface, it supports several types of web browsers, such as Internet Explorer, Microsoft Edge, Firefox, Chrome, Safari and Opera. However, it is not available for mobile devices.

    Reviews from Real Users

    Here’s what PeerSpot users of Vectra AI have to say about it:

    "One of the core features is that Vectra AI triages threats and correlates them with compromised host devices. From a visibility perspective, we can better track the threat across the network. Instead of us potentially finding one device that has been impacted without Vectra AI, it will give us the visibility of everywhere that threat went. Therefore, visibility has increased for us." - Dave W., Operations Manager at a healthcare company

    "It does a reliable job of parsing out the logs of all the network traffic so that we can ingest them into our SIEM and utilize them for threat hunting and case investigations. It is pretty robust and reliable. The administration time that we spend maintaining it or troubleshooting it is very low.” - T.S., Senior Security Engineer at a manufacturing company

    Sample Customers
    Paysafe, AdRoll, Pet Lovers Centre, Arlington Orthopedics, Humphreys & Partners Architects
    Tribune Media Group, Barry University, Aruba Networks, Good Technology, Riverbed, Santa Clara University, Securities Exchange, Tri-State Generation and Transmission Association
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company19%
    Financial Services Firm10%
    Manufacturing Company10%
    Government7%
    REVIEWERS
    Retailer18%
    Healthcare Company18%
    Insurance Company9%
    Energy/Utilities Company9%
    VISITORS READING REVIEWS
    Computer Software Company28%
    Manufacturing Company9%
    Financial Services Firm6%
    Retailer6%
    REVIEWERS
    Financial Services Firm17%
    Manufacturing Company11%
    University11%
    Computer Software Company9%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Financial Services Firm12%
    Government8%
    Manufacturing Company6%
    Company Size
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise16%
    Large Enterprise62%
    REVIEWERS
    Small Business40%
    Midsize Enterprise25%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business25%
    Midsize Enterprise30%
    Large Enterprise45%
    REVIEWERS
    Small Business13%
    Midsize Enterprise23%
    Large Enterprise64%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise14%
    Large Enterprise65%
    Buyer's Guide
    Secure Access Service Edge (SASE)
    March 2024
    Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Secure Access Service Edge (SASE). Updated: March 2024.
    767,847 professionals have used our research since 2012.

    Cato SASE Cloud Platform is ranked 5th in Secure Access Service Edge (SASE) with 21 reviews while Vectra AI is ranked 2nd in Intrusion Detection and Prevention Software (IDPS) with 39 reviews. Cato SASE Cloud Platform is rated 8.8, while Vectra AI is rated 8.6. The top reviewer of Cato SASE Cloud Platform writes "Useful remote worker VPN, centralized management, and simple on-boarding process". On the other hand, the top reviewer of Vectra AI writes "Integrates well with other security solutions and provides good technical support". Cato SASE Cloud Platform is most compared with Zscaler Zero Trust Exchange, Cisco SD-WAN, Prisma Access by Palo Alto Networks, Fortinet FortiGate and VMware SD-WAN, whereas Vectra AI is most compared with Darktrace, ExtraHop Reveal(x), Cisco Secure Network Analytics, Arista NDR and Trend Micro Deep Discovery.

    We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.