HomeManaged ServicesNext Gen IT-InfraMonitoring & ManagementCyber SecurityBCP / DRAutomation
Managed Services
msp-dubai-accounting-firms-managed-it

Why accounting firms in Dubai need an MSP before they think they do?

🕓 April 24, 2026

How FSD-Tech Deploys Xcitium Managed Security in the GCC

How FSD-Tech Deploys Xcitium Managed Security in the GCC

🕓 May 11, 2026

Next Gen IT-Infra
Cato’s SASE Supports Cybersecurity Skills Development

How Cato’s SASE Supports Cybersecurity Skills Development

🕓 April 8, 2025

How SASE Supports the Security Needs of SMBs

How SASE Supports the Security Needs of SMBs

🕓 February 9, 2025

Attack Surface Reduction with Cato’s SASE

Attack Surface Reduction with Cato’s SASE

🕓 February 10, 2025

SASE for Digital Transformation in UAE

SASE for Digital Transformation in UAE

🕓 February 8, 2025

Monitoring & Management
Cost-Performance Ratio: Finding the Right Balance in IT Management Networks

Cost-Performance Ratio: Finding the Right Balance in IT Management Networks

🕓 June 16, 2025

Atera’s Communication Tools

Atera’s Communication Tools: Boosting IT Team Productivity in the UAE

🕓 February 8, 2025

Emerging Trends in IT Management

Emerging Trends in IT Management

🕓 February 10, 2025

Atera Disaster Recovery

Atera Disaster Recovery: Top Strategies for UAE IT Teams

🕓 February 9, 2025

Cyber Security
Illustration of the Cato Cloud architecture showing its role in delivering SASE for secure, optimized global connectivity.

Understanding the Cato Cloud and Its Role in SASE

🕓 January 29, 2025

Isometric illustration of professionals managing network performance, bandwidth analytics, and cloud-based optimization around the Cato Networks platform, symbolizing bandwidth control and QoS visibility.

Mastering Bandwidth Control and QoS in Cato Networks

🕓 July 26, 2025

Global network backbone powering Cato SASE solution for secure, high-performance connectivity across regions.

Global Backbone: The Engine Powering Cato’s SASE Solution

🕓 January 30, 2025

Illustration of team analyzing application traffic and usage insights on a large laptop screen using Cato’s dashboard, surrounded by network and cloud icons.

Cato Networks Application Visibility | Monitoring & Control

🕓 July 27, 2025

BCP / DR
Illustration showing diverse business and IT professionals collaborating with cloud, backup, and security icons, representing Vembu use cases for SMBs, MSPs, and IT teams.

Who Uses Vembu? Real-World Use Cases for SMBs, MSPs & IT Teams

🕓 July 12, 2025

Graphic showcasing Vembu’s all-in-one backup and disaster recovery platform with icons for cloud, data protection, and business continuity for IT teams and SMBs.

What Is Vembu? A Deep Dive Into the All in One Backup & Disaster Recovery Platform

🕓 July 6, 2025

Illustration showing Vembu backup and disaster recovery system with cloud storage, server racks, analytics dashboard, and IT professionals managing data.

The Rising Cost of Data Loss: Why Backup Is No Longer Optional?

🕓 August 14, 2025

3D isometric illustration of cloud backup and data recovery infrastructure with laptop, data center stack, and digital business icons — FSD Tech

RPO & RTO: The Heart of Business Continuity

🕓 August 15, 2025

Automation
Cross-Functional Collaboration with ClickUp

Fostering Cross-Functional Collaboration with ClickUp for Multi-Departmental Projects

🕓 February 11, 2025

ClickUp Project Reporting

Revolutionizing Enterprise Reporting with ClickUp’s Advanced Analytics and Dashboards

🕓 June 16, 2025

ClickUp’s Design Collaboration and Asset Management Tools

Empowering Creative Teams with ClickUp’s Design Collaboration and Asset Management Tools

🕓 February 26, 2025

ClickUp Communication and Collaboration Tools

ClickUp Communication and Collaboration Tools: Empowering Remote Teams

🕓 March 12, 2025

    Subscribe to our newsletter!

    About Us

    Follow Us

    Copyright © 2024 | Powered by 

    Atera

    (60)

    Cato Networks

    (131)

    ClickUp

    (78)

    FishOS

    (7)

    Miradore

    (21)

    PointGuard AI

    (9)

    Vembu

    (24)

    Xcitium

    (35)

    ZETA HRMS

    (79)

    Table of Contents

    Cato Networks Flexible Traffic Routing: The Complete Split Tunneling 2.0

    Anas Abdu Rauf
    September 2, 2025
    Comments
    Cato Cloud Architecture Diagram Connecting Branch Offices, Data Centers, And Applications Through A Secure SASE Backbone

    Why This Update Changes Everything?

    Cato Networks has always promised "one client, any resource, anywhere." With Windows Client v5.16, that promise finally gains the nuance enterprise networks actually demand.

     

    Until now, IT teams faced a binary choice: route everything through the Cato Cloud (full tunnel) or manually carve out exclusions one CIDR block at a time. Neither scales gracefully in a hybrid world where the same employee moves between a secure office, a home router, a coffee-shop hotspot, and an untrusted client site — all in a single workday.

     

    The v5.16 release flips that model entirely. Instead of managing exceptions, you define intent — exactly which traffic flows should benefit from Cato's security stack, and which should take the fastest local path. For organizations in the middle of a phased SASE rollout, this isn't a minor update. It's the feature that removes the "big-bang" adoption barrier, reduces troubleshooting friction, and gives security teams confidence that critical controls remain in place even as legacy infrastructure coexists alongside modern deployments.

     

    Split Tunneling 2.0: What It Actually Means

    Split tunneling describes any deployment where a VPN or ZTNA client sends some traffic through a secure gateway while letting the rest travel over the local network. Historically, administrators relied on it for three reasons:

     

    Performance — Keep high-bandwidth or latency-sensitive applications like Microsoft Teams, Zoom, and CAD downloads off the encrypted path to reduce congestion and delay.

     

    Compatibility — Allow access to local printers, peer-to-peer discovery protocols, multicast services, and ISP-hosted resources that simply don't function over a full tunnel.

     

    Cost Control — Minimize egress fees at the cloud firewall or backbone by keeping bulk, non-sensitive traffic on local paths.

     

    The problem? Traditional split tunnel policies were static. A subnet excluded once stayed excluded regardless of where the laptop travelled. That blunt approach breaks down the moment a user changes environments — which, in a hybrid work model, happens constantly.

     

    Cato v5.16 solves this with four mutually reinforcing capabilities that make tunneling decisions dynamic, context-aware, and genuinely manageable at enterprise scale.

     

    Get Started with Cato

     

    Feature 1: Granular Split Tunnel Policy (Flexible Traffic Routing)

    The headline feature of v5.16 is the ability to craft multiple, ordered rules rather than maintaining a single allow/deny list. Each rule can match on any combination of:

     

    • Destination IP address or CIDR range
    • Protocol and port number
    • Application ID or application category
    • URL category or domain suffix
    • Source network context (managed vs. unmanaged — more on this below)

     

    The practical result is significant. End users reconnect less often and encounter fewer broken application links, because the client decides in real time which traffic deserves the secure path. Administrators gain a policy tool with genuine flexibility — you can keep Office 365 and SAP routed through Cato to benefit from CASB and DLP inspection, while simultaneously letting bulk software updates pull directly from Akamai or CloudFront at full local speed.

     

    Real-World Rule Examples:

    Scenario 1: Branch laptops must reach a legacy file server over MPLS, but everything else should flow over the tunnel. The old workaround was a static exclusion of 10.10.0.0/16 that broke access whenever the laptop left the branch. The new approach: IF destination = 10.10.0.0/16 AND source network = Managed THEN Exclude Tunnel. The rule only fires in the right context.

     

    Scenario 2: Field engineers need low-latency UDP/554 connections to industrial cameras, but only while physically on factory Wi-Fi. Previously this required a full interface-level split that risked exposing corporate traffic. The new rule: IF protocol = UDP AND port = 554 AND source network = Unmanaged THEN Exclude Tunnel.

     

    Scenario 3: The marketing team needs SaaS apps protected, but OS updates should download at full ISP speed. A category-based rule handles this cleanly without any IP list maintenance.

     

    Also Read: Cato SASE vs Zscaler: Which Secure Access Platform Wins on Visibility, Performance, and Simplicity?

    Feature 2: Web-Only Tunnel Option

    The web-only tunnel is a pre-defined rule set that steers only HTTP and HTTPS traffic (ports 80 and 443) through the Cato Cloud. Everything else — SMB, RDP, VoIP, game traffic, operating system updates — uses the local gateway.

     

    Why this matters by use case:

    Retail and performance-constrained sites: Payment terminals and web sessions are secured without backhauling large non-web flows across limited branch links.

     

    Regulated industries: File and voice traffic can remain on-premises for audit and compliance reasons, while web threat protection and CASB still apply to all SaaS activity.

     

    Day-one SASE onboarding: IT can enable web-only for a pilot group on day one, prove value with zero user disruption, then tighten the policy incrementally as confidence grows.

     

    From the end user's perspective, nothing feels different. Browser sessions load through Cato's secure PoP — so phishing filters and malware detection apply — while a YouTube video or Windows Update downloads at full speed from the local ISP cache. Security is invisible, which is exactly how it should be.

    Feature 3: DNS Split Tunneling

    Classic full-tunnel VPNs have always struggled with split-horizon DNS designs. Employees on the road can resolve internal corp.local records but lose reachability to the corresponding private IP. Or they hammer corporate resolvers with every public DNS query, adding latency for everyone on the link.

     

    Cato v5.16 resolves this with a clean architectural separation:

     

    Internal DNS queries — directed towards a private server IP or a configured domain suffix list — now bypass the client tunnel entirely. They resolve locally at full speed without touching the Cato Cloud.

    External DNS queries — public recursion — remain protected by either Cato's Secure Web Gateway or whatever upstream resolver the administrator configures.

     

    The benefits compound quickly: faster name resolution when working from home or on 5G, a smaller attack surface because private DNS stays within the user's subnet or VLAN, and a significantly easier migration path from legacy on-premises firewalls that already enforce DNS split-horizon.

     

    Pro tip: Pair DNS split tunneling with Cato's DNS Security feature so that even local recursive queries benefit from threat intelligence via DoH or DoT upstream. Speed and security are not mutually exclusive here.

     

    Also Read: Enabling Cloud Access Security Broker (CASB) in Cato

    Feature 4: Split Tunnel Rules Based on Source Network (Managed vs. Unmanaged)

    This is arguably the most strategically significant feature in the release. The Cato client can now identify whether a device is connected to a Managed Network — a corporate-controlled environment authenticated via a site certificate in the Cato portal — or an Unmanaged Network, meaning any untrusted connection such as a public Wi-Fi hotspot.

     

    Policies branch on that attribute. The same physical MacBook follows entirely different routing rules at a Starbucks versus at company headquarters — without any manual intervention from the user or a helpdesk ticket.

     

    Practical use cases:

    Office or branch LAN (Managed): Full tunnel — all traffic routes through Cato because you control the LAN firewall and want comprehensive inspection.

     

    Public Wi-Fi (Unmanaged): Only corporate application traffic routes via Cato; personal browsing stays local to respect privacy and reduce unnecessary data consumption.

    BYOD and contractor laptops: Unmanaged endpoints carry higher risk, so stricter inclusion rules apply automatically with minimal local bypass.

     

    M&A transition: Newly acquired subsidiary networks are initially flagged as unmanaged. IT gradually whitelists subnets as security posture alignment is confirmed, then flips the designation to managed — a smooth, auditable integration path.

    The "Trusted Networks" to "Managed Networks" Rename

    The UI terminology change seems cosmetic but carries meaningful intent. The word "trust" implies a binary, automatic state. "Managed" conveys that controls are actively enforced. This language shift reinforces zero-trust principles and removes ambiguity for auditors reviewing policy sets — a small change with real compliance communication value.

    How Daily Administration Gets Easier

    Beyond the end-user experience improvements, v5.16 materially reduces operational burden across four dimensions.

     

    Policy as Code (Sort of): Logical rule conditions mean fewer static subnet listings and no more hunting for duplicate entries. The policy structure resembles the firewall rule bases most network administrators already know, which shortens the learning curve.

     

    Change Once, Apply Everywhere: Update a single Split Tunnel profile in the Cato portal and every Windows Client at v5.16 or above adopts it on the next check-in. No registry edits, no software packaging cycles, no coordinating with endpoint management teams.

     

    Fewer Help-Desk Tickets: "Can't print" incidents drop significantly because local broadcast traffic never enters the tunnel. Packet-loss complaints decrease as voice and video traffic stays off the encrypted path when that path isn't QoS-tuned for real-time flows.

     

    Audit and Reporting Clarity: Cato's analytics now annotate traffic as Included or Excluded by rule ID, allowing security teams to prove traffic segmentation to compliance auditors with actual log evidence rather than policy screenshots.

     

    Also Read: Configuring Custom Application Control in Cato

    End-User Experience: Before and After

    Slow SaaS logins from hotel Wi-Fi: Before — all traffic hair-pinned to the nearest PoP, potentially hundreds of kilometers away. After — web-only policy sends SaaS through Cato's backbone while streaming and updates stay local. Noticeably snappier browsing.

     

    Local smart printer or NAS unreachable: Before — printer unreachable means user disables VPN entirely, creating an unmonitored security gap. After — a granular rule excludes 192.168.0.0/24 only when the Wi-Fi SSID matches a home network. Seamless printing without any tunnel changes.

     

    In-office Wi-Fi congestion: Before — full tunnel doubles the traffic load exiting the branch link. After — managed-network exemption keeps Microsoft Teams peer-to-peer traffic local, eliminating unnecessary backhaul.

     

    Battery drain on 5G hotspot: Before — every packet encrypted through the tunnel drains CPU cycles and mobile data allowance. After — split DNS plus TCP-only via tunnel reduces CPU overhead and lowers data consumption meaningfully.

     

    In every case, users experience faster and more stable connections without noticing the security controls operating behind the scenes.

    Does More Split Tunneling Mean Less Security?

    This is the most common objection to flexible routing — and it deserves a direct answer. No, provided implementation is done correctly.

     

     

    Cato's architecture still enforces identity verification, device posture checks, and application-level access controls at the first packet. Flexible routing dictates where inspection happens, not whether it happens. The following safeguards remain fully intact regardless of split configuration:

     

    ZTNA policy — per-application or private-IP steering still authenticates every session against the access policy engine before traffic is permitted.

    CASB, IPS, DLP, and SWG — all continue to function for traffic that traverses the Cato Cloud, regardless of how the split tunnel is configured.

    SaaS security coverage — even a web-only tunnel captures approximately 90% of risky content, including phishing attempts, malware downloads, and credential harvesting posts.

    Endpoint EDR — fills the inspection gap for traffic that stays local, maintaining a genuine defense-in-depth posture across the entire device.

     

    The key operational safeguard: monitor the "Excluded Traffic" widget in Cato's analytics on a weekly basis. Unexpected spikes in excluded traffic volume often signal shadow-IT adoption or mis-tagged applications — catching these early keeps the security surface tight.

    Step-by-Step Implementation Guide

    Step 1 — Update Clients Push Windows Client v5.16 via your RMM tool or Microsoft Intune. macOS and mobile clients will receive equivalent flexible routing features in subsequent releases.

     

    Step 2 — Define Managed Networks In the Cato portal, enumerate branch LAN subnets, HQ Wi-Fi SSIDs, or install a site certificate on routers to authenticate managed environments. This is the foundation that makes context-aware policies possible.

     

    Step 3 — Author Split Policies Start with a web-only rule for a pilot group of 50 to 100 users. Then add "Include" rules for private resources (for example, 10.30.0.0/16 for ERP access). Use URL categories rather than raw IP addresses for SaaS targets — Microsoft, Salesforce, and similar providers update their IP ranges weekly, and category-based rules stay current automatically.

     

    Step 4 — Validate Use Cato's Real-Time Traffic view to confirm traffic is following expected paths. Supplement with nslookup and tracert from endpoint devices to verify DNS resolution and routing behavior match your policy intent.

     

    Step 5 — Roll Out in Waves Marketing and HR teams (primarily web-heavy workloads) first. Engineering teams (Git, SSH, API traffic) next. Finally, call-centre and communications teams (voice and video) once QoS baselines are proven on the expanded deployment footprint.

    Best Practices and Pro Tips

    Use URL categories, not raw IPs, for SaaS: Cloud providers update their IP ranges constantly. Category-based rules leverage Cato's cloud database and stay accurate automatically.

     

    Enable DoH for external DNS inside the tunnel: DNS-over-HTTPS prevents ISP-level visibility into which SaaS tools your organization uses — a meaningful privacy and intelligence protection measure.

     

    Version-tag your rules: Label rules with identifiers like WebOnly_v1 or EngineeringFull_v2. This simplifies rollback procedures and makes change-control audits significantly cleaner.

     

    Automate Managed Network lists via the Cato API: Pulling network definitions from DHCP scopes programmatically is essential for M&A scenarios where dozens of new sites need onboarding quickly.

     

    Review "Excluded Traffic" weekly: Treat this widget as a security canary. Consistent baselines are healthy; spikes warrant investigation.

     

    Pair DNS split tunneling with DNS Security: Local recursive queries can still pass through Cato's threat intelligence layer via DoH or DoT upstream, maintaining visibility without sacrificing speed.

    Which Industries Benefit Most

    Retail: Secure card transactions and web sessions through Cato while keeping POS firmware updates and in-store device traffic on local links — no backhaul of large non-web flows.

     

    Healthcare: Route sensitive patient data and SaaS tools through Cato while allowing local DICOM imaging traffic to stay on-premises, supporting both compliance and clinical workflow performance.

     

    Manufacturing: Prioritize industrial control and OT traffic locally while securing SaaS and cloud management tools globally via Cato. Field engineers get context-aware policies based on whether they're on the factory floor or a remote site.

     

    Professional Services: Enable seamless remote work with secure SaaS routing for consultants while respecting personal browsing privacy for BYOD users through managed vs. unmanaged network rules.

    Conclusion

    The Flexible Traffic Routing update transforms the Cato client from a straightforward cloud VPN into a context-aware traffic director. End users benefit from faster, battery-friendlier connections. Administrators gain firewall-style policy controls without the complexity of static subnet management. And the business enjoys a smoother, phased SASE adoption path without compromising the security posture that justifies the investment.

     

    If your organization is still running an all-or-nothing VPN — whether legacy or an earlier Cato configuration — v5.16 is the moment to pilot web-only tunneling and DNS split on a subset of devices. Support tickets will likely drop, adoption will accelerate, and the network agility that leadership has been promised for years finally becomes demonstrable — no forklift upgrade required.

     

    Curious how Flexible Traffic Routing could reduce tickets in your environment? 

     

    Book a Free Consultation with our Cato expert Today.
     
     

    Cato Networks Infographic On Flexible Traffic Routing Showing Old VPN Problems, Split Tunneling Features, And Enterprise Use Cases

    Frequently Asked Questions

    What is flexible traffic routing in Cato's SASE client?

    Flexible traffic routing allows IT teams to define granular split-tunneling policies. Instead of an all-or-nothing VPN tunnel, admins decide which applications, ports, protocols, or domains flow through the Cato Cloud and which stay on the local network. It replaces static subnet exclusions with dynamic, context-aware rules.

     

    How is Cato split tunneling different from traditional split tunneling?

    Traditional split tunneling used static subnet exclusions that broke whenever users changed network environments. Cato's approach is context-aware: policies adapt based on location (managed vs. unmanaged networks), application type, and protocol, ensuring consistent security and user experience regardless of where the device connects from.

     

    Does flexible traffic routing weaken security?

    No. Identity verification, device posture checks, and ZTNA policies still apply at the first packet. CASB, IPS, DLP, and SWG continue functioning for cloud-routed traffic. Local traffic is covered by endpoint EDR or existing LAN firewalls, maintaining a genuine defense-in-depth posture.

     

    What is the web-only tunnel option in Cato Networks?

    The web-only tunnel routes only HTTP and HTTPS traffic (ports 80 and 443) through the Cato Cloud. All other traffic — OS updates, file transfers, VoIP — bypasses it locally. Users still receive full web protection while non-web traffic flows at local ISP speeds without overhead.

     

    What are managed vs. unmanaged networks in Cato?

    A managed network is a corporate-controlled environment authenticated via the Cato portal — typically an office LAN, branch SD-WAN, or certified home network. An unmanaged network is any untrusted connection such as public Wi-Fi. Split tunnel policies apply different routing rules based on which type the device is currently connected to.

     

    What is DNS split tunneling and why does it matter?

    DNS split tunneling allows internal DNS queries for private domains to bypass the Cato tunnel for fast local resolution, while public DNS queries remain protected by Cato's SWG and threat intelligence. It reduces latency, improves hybrid network compatibility, and simplifies migration from on-premises firewalls.

     

    Can flexible traffic routing support a phased SASE rollout?

    Yes — this is one of its primary design goals. Organizations can begin with web-only or DNS split tunneling for a pilot group, then expand policies incrementally to more users and application categories. This approach reduces deployment risk and eliminates the need for disruptive big-bang migrations.

     

    Why was "Trusted Networks" renamed to "Managed Networks" in v5.16?

    The rename reflects a zero-trust philosophy shift. "Trust" implies something binary and automatic. "Managed" indicates that your organization actively enforces controls in that environment. The updated terminology reduces ambiguity for auditors reviewing policy documentation and better reflects contemporary security postures.

    Cato Networks Flexible Traffic Routing: The Complete Split Tunneling 2.0

    About The Author

    Anas Abdu Rauf

    Anas is an Expert in Network and Security Infrastructure, With over seven years of industry experience, holding certifications Including CCIE- Enterprise, PCNSE, Cato SASE Expert, and Atera Certified Master. Anas provides his valuable insights and expertise to readers.

    TRY OUR PRODUCTS

    Like This Story?

    Share it with friends!

    Subscribe to our newsletter!

    FishOSCato SASEVembuXcitiumZeta HRMSAtera
    Isometric illustration of a centralized performance platform connected to analytics dashboards and team members, representing goal alignment, measurable outcomes, risk visibility, and strategic project tracking within ClickUp.

    How ClickUp Enables Outcome-Based Project Management (Not Just Task Tracking)

    🕓 February 15, 2026

    Isometric illustration of a centralized executive dashboard platform connected to analytics panels, performance charts, security indicators, and strategic milestones, representing real-time business visibility and decision control within ClickUp.

    Executive Visibility in ClickUp – How CXOs Gain Real-Time Control Without Micromanaging

    🕓 February 13, 2026

    Cato SASE Architecture

    Inside Cato’s SASE Architecture: A Blueprint for Modern Security

    🕓 January 26, 2025

    Workflow Automation(8)

    Workforce Automation(1)

    AI Project Management(1)

    HR Data Automation(1)

    RMM(2)

    Firewall Security(1)

    IT Workflow Automation(1)

    IT security(2)

    GCC compliance(4)

    Payroll Integration(2)

    IT support automation(3)

    procurement automation(1)

    lost device management(1)

    IT Management(5)

    IoT Security(3)

    Cato XOps(1)

    IT compliance(5)

    Task Automation(1)

    Workflow Management(1)

    Kubernetes lifecycle management(2)

    OpenStack automation(1)

    AI-powered cloud ops(1)

    SMB Security(8)

    Data Security(1)

    MDR (Managed Detection & Response)(3)

    Atera Integrations(2)

    MSP Automation(3)

    XDR Security(2)

    Threat Detection & Response(1)

    SMB Cyber Protection(1)

    Ransomware Defense(3)

    HR Tech Solutions(1)

    Zero Trust Network Access(3)

    Post-Quantum Cryptography(1)

    Quantum Threat UAE & GCC(1)

    Quantum Security(1)

    Zero Trust Security(2)

    Cloud IDE Security(1)

    Endpoint Management(1)

    SaaS Security(2)

    Payroll Automation(5)

    IT Monitoring(2)

    Xcitium EDR SOC(15)

    Ransomware Protection GCC(1)

    M&A IT Integration(1)

    Network Consolidation UAE(1)

    MSSP for SMBs(1)

    Antivirus vs EDR(1)

    Managed EDR FSD-Tech(1)

    FSD-Tech MSSP(25)

    Ransomware Protection(3)

    SMB Cybersecurity GCC(1)

    Endpoint Security(1)

    Cybersecurity GCC(15)

    Data Breach Costs(1)

    Endpoint Protection(1)

    SMB Cybersecurity(8)

    Managed Security Services(2)

    Xcitium EDR(30)

    Zero Dwell Containment(31)

    Hybrid Backup(1)

    Cloud Backup(1)

    Backup & Recovery(1)

    pointguard ai(4)

    vembu(9)

    disaster recovery myths(1)

    SMB data protection(9)

    backup myths(1)

    Disaster Recovery(4)

    Vembu BDR Suite(19)

    GCCBusiness(1)

    DataProtection(1)

    Secure Access Service Edge(4)

    Unified Network Management(1)

    GCC IT Solutions(1)

    GCC HR software(20)

    financial cybersecurity(2)

    open banking(1)

    CC compliance(1)

    Miradore EMM(15)

    Cato SASE(9)

    Government Security(1)

    Cloud Security(9)

    GCC Education(1)

    Hybrid Learning(1)

    Talent Development(1)

    AI Governance(4)

    AI Risk Management(1)

    AI Cybersecurity(13)

    AI Security(2)

    AI Compliance(2)

    Secure Remote Access(1)

    GCC business security(1)

    GCC network integration(1)

    compliance automation(5)

    GCC cybersecurity(3)

    education security(1)

    App management UAE(1)

    Miradore EMM Premium+(5)

    BYOD security Dubai(8)

    share your thoughts

    Isometric diagram showing Cato SASE troubleshooting workflow where device inventory, DHCP mapping, posture validation, and firewall event logs are analyzed to diagnose device-based rule enforcement issues.

    Troubleshooting Device-Based Firewall Rules in Cato SASE

    🕓 March 13, 2026

    Isometric diagram showing Cato SASE device inventory analyzing network traffic, DHCP data, and device attributes to support WAN and Internet firewall enforcement and device-aware security policies.

    Understanding Device Identification Limitations in Cato Device Inventory

    🕓 March 8, 2026

    Isometric diagram showing Cato SASE cloud analyzing network traffic, DHCP data, and MAC address fingerprints to identify devices and enable accurate device-based firewall enforcement.

    Why DHCP Configuration Matters for Device-Based Firewall Enforcement in Cato SASE

    🕓 March 7, 2026

    Managed Services(2)

    Decoded(245)

    Cyber Security(129)

    BCP / DR(24)

    Zeta HRMS(78)

    SASE(21)

    Automation(80)

    Next Gen IT-Infra(128)

    Monitoring & Management(81)

    ITSM(22)

    HRMS(21)

    Automation(24)