Cato SASE Insider with Josh Snow
Cato SASE Insider offers an exclusive peek into the dynamic world of Secure Access Service Edge (SASE) solutions, with seasoned tech enthusiast Josh Snow at the helm. Delve into comprehensive reviews, in-depth analyses, and cutting-edge insights on Cato Networks' SASE platform, unraveled and explained in plain language. Join us as we navigate through the complexities of network security, cloud connectivity, and digital transformation, empowering viewers to make informed decisions in the rapidly evolving landscape of cybersecurity. Stay ahead of the curve with Cato SASE Insider, where expertise meets exploration, and innovation meets intuition.
Cato SDK 101: Introduction & Building Your First Queries
Mastering Cato Go SDK Queries: A Practical Guide for Developers
Deploying the Cato Sentinel Connector | Full Installation & Setup Guide for Azure Sentinel
Dynamic Resources with Cato & Terraform: Automate and Scale Your Infrastructure
Intro to Terraform & Cato: Setup, Authentication, and Your First Terraform Apply
Introduction to Terraform – From Setup to Your First Apply
Introducing the Cato GraphQL API Playground
Introduction to Cato API - Setup to Your First Real API Call
📊 Working with Device Dashboards – Turn Visibility into Action
🔍 Device Discovery 101 – What’s IT, IoT & OT?
🔒 Zero Trust for IoT & OT Devices – Smarter Security with Device Attributes
Cato Rapid Recap for July 2025
CMA Security: Introduction to TLS Inspection
CMA Security Introduction to EPP & XDR
CMA Security- Introduction to Basic Data Protection Inline & API
CMA Introduction to the Internet & WAN Firewall
Real-World Use Case: Clientless Contractor Access in Under 2 Minutes
The Screenshot Loophole - in Under 60 Seconds
Browser Access Control - Behind the Portal
Positioning Browser Access in Cato’s Remote Access Portfolio
Browser Access Control - Real World Use Case
Browser Access Control- Clientless RDP & SSH
Publishing Applications with Zero Trust Control
Cato Clientless Remote Access: Introduction to Browser Access Control & the Applications Portal
📊 GenAI Reports – Visibility You Can Share | On-Demand Insights for Policy & Usage
📣 Send GenAI Alerts to Slack | Real-Time Notifications for Policy Violations
Granular Zero Trust GenAI Controls | Zero Trust Targeted Protection
Shadow GenAI: Block, Prompt, or Monitor | Flexible Access Control for GenAI Tools
Detect and Block Sensitive Data Shared with GenAI Tools
Enterprise GenAI: Risk, Protection & Policy - Introduction