Report Highlights Massive Scale of Automated Cyberattacks

Gartner first gave name to the Secure Access Service Edge (SASE) model, effectively defining it. SASE combines WAN and security as a cloud service. 


In 2019, Gartner wrote, "SASE is a new package of technologies including SD-WAN, SWG, CASB, ZTNA and FWaaS as core abilities, with the ability to identity sensitive data or malware and the ability to decrypt content at line speed, with continuous monitoring of sessions for risk and trust levels."


Since that time, major security firms have been developing or acquiring SASE capabilities to build into their own platforms, leaving Cato Networks as one of the first and few pure SASE firm.


On March 25, 2021, Gartner wrote, “By 2025, at least 60% of enterprises will have explicit strategies and timelines for SASE adoption encompassing user, branch and edge access, up from 10% in 2020.”


Today, Cato Networks has released an analysis of the network flows across its platform during Q1, 2021, seeking anomalous behavior in approximately 200 billion traffic flows during Q1, 2021. It highlights hostile scans, attempts at exploitation, malware beacons and C2 communications. The result shows an increase in attempts to brute force remote administration tools, while attempts to target PHP vulnerabilities dominate remote code exploitation attacks.


For its analysis, the firm defines a network flow as any sequence of packets sharing a common IP and port, destination IP and port, and protocol. It found 16 billion events that triggered one of its security controls; 181,000 high risk flows based on its machine learning and data correlation; and 19,000 verified security incidents.


It found almost 5.7 billion network scans, almost 230 million attempts to communicate with domains known to have a bad r ..

Support the originator by clicking the read the rest link below.