May 22, 2025 4m read

Cato Networks Demonstrates AI-Based Policy Analysis and Enforcement at AWS Summit Tel Aviv 2025 

Guy Waizel
Naor Kalbo
Guy Waizel , Naor Kalbo

Table of Contents

Wondering where to begin your SASE journey?

We've got you covered!
Listen to post:
Getting your Trinity Audio player ready...

The Hidden Risk in Security Policies 

Policy misconfigurations remain one of the most common and costly risks in network security. Studies in recent years have shown that the vast majority of firewall breaches stem from policy configuration errors, and human mistakes or skill gaps continue to be a leading cause of major security incidents. Traditionally, organizations either wait for a breach or an audit to detect issues, both of which are reactive approaches. 

NIST warns that policy misconfigurations can enable unauthorized access. MITRE ATT&CK techniques like T1046 (Network Service Discovery) and T1562 (Impair Defenses) show how attackers exploit them.warns that policy misconfigurations can enable unauthorized access. MITRE ATT&CK techniques like T1046 (Network Service Discovery) and T1562 (Impair Defenses) show how attackers exploit them. 

In response to this growing challenge, Cato Networks announced a new AI-driven capability on May 13, Cato Autonomous Policies, with the first use case being Autonomous Policies for FWaaS. This new solution continuously uncovers policy misconfigurations by analyzing the intent behind policy rules, not just their syntax, and puts enterprises in control, enabling a more proactive and continuous approach to their Zero Trust strategy. Naor Kalbo (principal researcher, Cato Networks), Meidan Nasi (solutions architect, AWS), and Yazan Khalaf (solutions architect, AWS) will present this breakthrough and its impact on firewall policy management in a talk at AWS Summit Tel Aviv 2025 on May 28 at 11:45 AM IST in Pavilion 10 – Hall B. (While you’re there, join us for two other sessions including a fireside chat with Cato Networks CEO Shlomo Kramer. More details can be found here.

From Static Checks to Smart Context 

Legacy policy enforcement typically relies on manual reviews, posture scores, and static rule evaluations, which are difficult to scale in today’s dynamic and complex environments. With thousands of overlapping firewall rules created to meet real business needs, security teams often struggle to identify which rules are obsolete, temporary, or misconfigured. The risk of disrupting critical services frequently results in unused or overly permissive rules being left in place. 

Cato Autonomous Policies for FWaaS addresses this challenge with a multidimensional approach. By leveraging AI to analyze the intent behind rules, including sentiment elements such as rule names, descriptions, and behavioral patterns, Cato Autonomous Policies for FWaaS identifies policy misconfigurations that traditional tools overlook. Traditional policy configuration analysis has reached its limits. It often misses subtle but important signals hidden in text-based, context-rich data. Cato Autonomous Policies for FWaaS operates proactively and continuously and is designed to meet the realities of modern, large-scale network environments. 

Firewall-as-a-Service (FWaaS) | Visit our page

Inside the Innovation: How It Works 

Cato Autonomous Policies for FWaaS is part of the Cato SASE Cloud Platform. The new approach to identifying policy misconfigurations goes beyond simple detection by interpreting intent, identifying anomalies, and assessing risk in ways that traditional tools are not equipped to handle. Cato Autonomous Policies for FWaaS leverages Amazon Bedrock to continuously analyze not only rule configurations, but also the intent behind them by interpreting metadata such as rule names and free-text descriptions. This approach enables the identification of policy misconfigurations that are typically missed by traditional tools. As a result, we enable more accurate and efficient detection of unused, obsolete, or overly permissive rules, without increasing the operational burden on security teams. 
 

In Figure 1, we illustrate the system architecture and how we apply contextual AI analysis across policy layers to uncover policy misconfigurations that traditional tools often miss. 

Figure 1. AI-powered engine analyzing policy misconfigurations

In Figures 2 and 3, we show examples where temporary or expired rules created for past business needs were flagged. These rules had been forgotten or overlooked among thousands of others and have now surfaced for action. 

Figure 2. Identified temporary rules with risky overexposure and suggested actions 

Figure 3. Identified expired rules with risky overexposure and suggested actions 

This is just a sneak peek at what’s coming. We will demonstrate the full capability of Cato Autonomous Policies for FWaaS at AWS Tel Aviv Summit 2025. We look forward to seeing you there. 

Related Topics

Wondering where to begin your SASE journey?

We've got you covered!
Guy Waizel

Guy Waizel

Tech Evangelist

Guy Waizel is a Tech Evangelist at Cato Networks and member of Cato CTRL. As part of his role, Guy collaborates closely with Cato's researchers, developers, and tech teams to bridge and evangelize tech by researching, writing, presenting, and sharing key insights, innovations, and solutions with the broader tech and cybersecurity community. Prior to joining Cato in 2025, Guy led and evangelized security efforts at Commvault, advising CISOs and CIOs on the company’s entire security portfolio. Guy also worked at TrapX Security (acquired by Commvault) in various hands-on and leadership roles, including support, incident response, forensic investigations, and product development. Guy also held key roles at tech startups acquired by Philips, Stanley Healthcare, and Verint. Guy has more than 25 years of experience spanning across cybersecurity, IT, and AI. Guy is in the final stages of his PhD thesis research at Alexandru Ioan Cuza University, focused on the intersection of cloud adoption, cybersecurity, and AI. Guy holds a MBA from Netanya Academic College, a B.S. in technology management from Holon Institute of Technology, and multiple cybersecurity certifications.

Read More
Naor Kalbo

Naor Kalbo

Principal Researcher

Naor Kalbo is a Principal Researcher at Cato Networks and a member of Cato CTRL, driving innovation at the convergence of cybersecurity and artificial intelligence space. With over a decade of experience, he has led groundbreaking initiatives in ML/AI, computer networks, and XIoT security, focusing on identifying emerging threats, minimizing attack surfaces and enhancing organizational resilience. Naor holds a BSc and MSc in Engineering and Cyber-Security from Ben-Gurion University, Israel, and has presented his work at leading global conferences. With hands-on experience in both startups and enterprise-level organizations, Naor excels in developing cutting-edge cybersecurity solutions and inspiring the next generation of defenders.

Read More