Try our new research platform with insights from 80,000+ expert users

Cato SASE Cloud Platform vs Microsoft Defender for Cloud Apps comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 7, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Cloud Access Security Brokers (CASB)
7th
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
19
Ranking in other categories
Secure Web Gateways (SWG) (7th), Internet Security (3rd), Web Content Filtering (1st), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Cato SASE Cloud Platform
Ranking in Cloud Access Security Brokers (CASB)
6th
Average Rating
8.8
Reviews Sentiment
7.7
Number of Reviews
30
Ranking in other categories
WAN Optimization (1st), Intrusion Detection and Prevention Software (IDPS) (9th), Software Defined WAN (SD-WAN) Solutions (3rd), WAN Edge (4th), ZTNA as a Service (3rd), Secure Access Service Edge (SASE) (4th), Remote Browser Isolation (RBI) (2nd)
Microsoft Defender for Clou...
Ranking in Cloud Access Security Brokers (CASB)
4th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
39
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Microsoft Security Suite (12th)
 

Mindshare comparison

As of August 2025, in the Cloud Access Security Brokers (CASB) category, the mindshare of iboss is 2.1%, up from 1.4% compared to the previous year. The mindshare of Cato SASE Cloud Platform is 10.6%, up from 5.9% compared to the previous year. The mindshare of Microsoft Defender for Cloud Apps is 9.5%, down from 12.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Access Security Brokers (CASB)
 

Featured Reviews

Matt Crockford - PeerSpot reviewer
It's easy to roll out, and their understanding of our business made it seamless
One aspect we value about iboss is its simplicity. Their customer service is brilliant, and they are super responsive and knowledgeable. It's easy to roll out, and their understanding of our business made it seamless. We were impressed by the solution's mental health function, which can detect if someone needs help. It scans what users are browsing and flags warning signs so we can check to see if they are okay. We've had to use it a couple of times. The user interface is highly intuitive. Our IT team picked it up with minimal training. It's arranged so that it's easy to find where things are. Another advantage is the single pane of glass console, which gives you visibility into what's happening. We're not fully there yet because we haven't implemented zero trust, but we're excited about the possibilities from the demos we've seen. We launched a POC of iboss' ChatGPT Risk Protection feature two weeks ago. AI is a great tool, but you need to be careful what you put into it. My biggest fear is employees inputting sensitive corporate information or customer PII data into one of these chatbots. I was impressed by our trial of the feature. It's exactly what we wanted. Now, when a user goes to ChatGPT, there's a banner warning them not to share information, and we can block conversations containing customer data like bank details and email addresses. I don't want to stop people from using it, but we need visibility. We've only tried it on a test group of 15 people. You can configure it to look for specific keywords or integrate it with your DLP policy if you have that configured
Alexander Azikov - PeerSpot reviewer
Provide a seamless experience for end users with internet duplication feature
The setup and onboarding process is very straightforward - I'd rate it a ten out of ten for ease. We use CatoCloud as our cloud provider. They have points of presence, and we connect to the nearest one to our physical location. All the routing, inspection, and logic for what to route, block, or allow happens in the cloud, not on the local device. Our deployment took a couple of weeks because we installed the sites manually. If we had a team to help switch locally, it could have been done in a week. The deployment process is straightforward. We set up all the sites in their cloud system; then, they ship the sockets directly to the location or our main office. We connect the device to the internet, it gets activated, we assign it to a specific site inside the cloud, and it's online and ready to use. It's very easy.
Jagadeesh Gunasekaran - PeerSpot reviewer
Saves us time, has good visibility, and a single dashboard
The solution is user-friendly and provides great visibility into threats. There are easy options available for specific workflow inspections. We can also get support by going through the Microsoft documentation, which is straightforward. Microsoft Defender for Cloud Apps helps us prioritize threats across our enterprise. It covers us from a compliance perspective and protects our organization's data. Data protection is a very important aspect of any new organization, as we need to protect our data from both external attacks and insider threats. Microsoft Defender for Cloud Apps helps us monitor for abnormal activity by insiders, which is one of the most important access points for attackers today. Additionally, the different cloud apps that Defender for Cloud Apps supports provide us with much more visibility into potential threats and activities on the internet. We have integrated Microsoft Defender for Cloud Apps alerts with Sentinel. The integration is straightforward. We can find the configuration details on Microsoft's official documentation website. If we are familiar with how Microsoft products work, we will be able to follow the instructions clearly. Microsoft Defender for Cloud Apps and Sentinel work natively together to deliver coordinated detection and response across our environment. Our integrated Microsoft solutions provide comprehensive threat protection, covering most of the tactics and techniques relevant to the MITRE ATT&CK framework. Sentinel allows us to ingest data from our entire ecosystem. When implementing an SIEM solution, there are always prerequisites such as Active Directory logs, security logs, firewall logs, and DNS logs. These are important logs that need to be ingested into the environment. Sentinel has many third-party connectors available that make integrations straightforward. Microsoft provides the configuration details in the Sentinel platform. It is important to integrate all relevant log sources into the SIEM solution so that we can detect and be alerted to any type of threat factor, whether it is from an internal or external source. Integrating third-party solutions into the platform requires a separate configuration, but Microsoft provides the necessary information. However, we need to have the appropriate permissions to execute these setups. Sentinel provides a centralized dashboard that covers threat management and configuration. It gives us complete insight into what entities are accessing, as well as full details for investigation. We can see how the alerts and threats are relevant to suspicious activities, whether they are related to malicious IP addresses, suspicious ASHAs, or any other indicators of compromise. All of this relevant data can be seen in a single pane. Recently, Microsoft introduced a new investigation experience in a single pane. This means that we can now get a lot of details in a single pane, without having to go there and execute a query. There are a lot of new insights being developed in the Sentinel platform these days. It has software intelligence. They recently introduced Microsoft Defender Threat Intelligence, which covers almost all IOCs. This protects organizational assets from threats and suspicious traffic associated with IOCs. If a match is found, alerts are generated. This is a very interesting feature. Another great feature is automation and logic apps. We can create a number of operations, such as posting in a team's channel if a severe incident occurs or sending an email notification. There are many operations available, so we can automate a lot of tasks. Microsoft Defender for Cloud Apps helps us stay compliant. It has predefined mechanisms in place to prevent attacks. For example, if an external user tries to access our SharePoint folders or files, an attack will be blocked. This is why it is important to give appropriate access to guest users. Microsoft Defender for Cloud Apps has many features and benefits. It provides a number of policies that can be configured to meet the specific needs of our security team. These policies can be used to customize cloud applications so that only authorized users can access them and perform operations that benefit the organization. In terms of safety and security, Microsoft Defender for Cloud Apps is top-notch. Using the solution's automation features, we can suppress false positive alerts. We can also close alerts, lower their severity from "high" to "low" or "informational," or close them immediately with the appropriate commands. This will depend on the configuration automation rule and the perspective from which we are testing. Microsoft Defender for Cloud Apps provides a single console. We are also provided with Microsoft templates to enable workbooks instantly. Alternatively, we can build our own customized workbooks to provide better insights and improve our SOC efficiency and overall performance. Consolidating all of our security data into one dashboard has saved our security operations team a significant amount of time. From an analyst's perspective, it is now much easier to correlate events, investigate alerts, and visualize specific entities. For example, an analyst can quickly see all of the alerts associated with a particular IP address, or they can view all of the activity for a specific entity over the past 24 hours or 7 days. This level of detail and insight would not be possible if our data were siloed in multiple dashboards. The single dashboard saves our operations approximately 20 hours per week by eliminating the need to access multiple consoles and tabs. Microsoft Defender for Cloud Apps threat intelligence can help us prepare for potential threats before they happen. However, it depends on how we develop the policies for the database to block or ignore things in our environment.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It was a very easy product to install. It can be deployed very fast."
"iboss is easy to use despite its complexity. Multiple engineers manage it, but it's significantly more straightforward to administer than traditional VPNs and web proxies."
"Iboss is a solution that prevents advanced persistent threats, and has a zero tolerance for attacks."
"Granular setup, which was able to set different levels of filters using the OUs in the AD."
"From a use-case scenario, what I like the most is the plug-in. I like the fact that we can do the filtering of these devices offsite independent of the network they are connected to, and we do not have to have traffic coming back inside our network."
"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"Technical support is pretty sharp and very responsive."
"iboss is among the few products providing inline filtering where no application is needed on the device."
"It is a stable solution...it is a scalable solution."
"The most valuable feature of Cato Networks is the CASB and the documentation is useful."
"The WAN aggregation feature is the most valuable."
"The query and the SD-WAN are useful features of the solution."
"What I found most helpful in Cato Networks is that it works out of the box. One of its main advantages is that it's a simple product to deploy. You subscribe, and you're ready to run."
"The Cato SASE Cloud Platform supports my customers' needs for connectivity and security by removing the throttling from the headquarters and putting a firewall in the cloud, instead of having to use a costly MPLS network to perform security inspection on all traffic from various branches."
"When I first encountered Cato, I didn't know how to use it, but after a week of training, I could onboard our systems to it, so the solution was easy to learn and navigate."
"The feature that I find to be the most valuable is the bandwidth aggregation."
"Defender for Cloud Apps has given us good visibility regarding what we've allowed in our environment until now. It helps us to know our inventory, understand what our customers are using, and steer them toward safer practices."
"On-demand scanning is the most valuable feature. In addition, it's a fairly fluid product. It syncs back to the cloud and provides metrics. It's pretty intelligent."
"The integration within the entire Defender suite is highly valuable because it allows for communication between different components and offers pretty decent correlations."
"The most valuable feature of this solution is its monitoring."
"The solution does not affect a user's workflow."
"Microsoft Defender for Cloud Apps is very comprehensive, providing a complete 360-degree view of applications within an organization."
"Defender helps us control which applications are being used and gain more security insight into remote and hybrid users based on user identity and log in location. You can also integrate Defender for Cloud Apps with Defender for Endpoint to extend its capabilities."
"The ability to sanction unsanctioned apps using Secure Score benchmarking, included in Cloud, is also beneficial."
 

Cons

"Their on-premise hardware's network interface is capped at one gigabit, which is sort of a problem. If you stand a filter up where all traffic flows through that, according to them, in order to go above a gigabit, you have to have multiple devices, which in today's IT seems a little bit silly. They could easily put in an SFP port into their device that could accommodate 10 gigs or at least offer a box."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"Its pricing could be better."
"The reporting feature needs improvement."
"For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company ExxonMobil."
"Our iboss subscription access should be more secure with an OTP or VPN etc. It is easy to gain access if, for example, hackers obtain my username and password."
"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"The product must evolve into the endpoint domain."
"However, Cato's solution is modular. You don't have to buy the whole package; instead, you can start with some of the functionality and then expand it as you see fit, based on its value and as your other contracts expire."
"There's no principal in Malaysia, only a distributor."
"There should be a Web Application Firewall feature in the product nodes."
"A little tweaking or improvement of the UI in terms of logging when troubleshooting would be an improvement because it's very detailed."
"We would like the product to continue to improve its security."
"The product may be complex for users with few years of experience."
"Its functionality is a bit limited in some areas as compared to a Cisco solution. It is not as granular. It doesn't have the manageability, feature set, and capabilities of a larger or an enterprise-level solution. It just needs a more robust feature set and granularity."
"The response time could be better. It will be helpful if the alerts are even more proactive and we can see more data. Currently, the data is a little bit weak. It is not complete. I can't just see it and completely know which user or which device it is. It takes some effort and time on my part to investigate and isolate a user. It would be great if it is more user-friendly or easy for people to understand."
"They need to improve the attack surface reduction (ASR) rules. In the latest version, you can implement ASR rules, which are quite useful, but you have to enable those because if they're not enabled, they flag false positives. In the Defender portal, it logs a block for WMI processes and PowerShell. Apparently, it's because ASR rules are not configured. So, you generally have to enable them to exclude, for example, WMI queries or PowerShell because they have a habit of blocking your security scanners. It's a bit weird that they have to be enabled to be configured, and it's not the other way around."
"In the future, I would like to see more plug-and-play capabilities that use AI to tell you what needs to be done. It would be helpful if it scanned our devices and made security suggestions, on a configuration basis."
"Sometimes the support is actually lacking."
"The product is very good so far, however, it would be better if it could include more up-to-date threat protection."
"Microsoft Defender for Cloud Apps' initial setup was quite technical but we were prepared. The time of the implementation depends on the job and how many users are being set up."
"A significant improvement I would like to see is the integration into a single pane of glass, which would allow me to view everything in one place rather than having to switch between different areas."
"It takes some time to scan and apply the policies when there is some sensitive information. After it applies the policies, it works, but there is a delay. This is something for which we are working with Microsoft."
 

Pricing and Cost Advice

"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is expensive compared to one of its competitors."
"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"It is probably in line with other solutions, but I do not deal with the financial side."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"The overall pricing for iboss is very competitive and transparent."
"Cato Networks seems more expensive than Cisco Meraki."
"I'd rate Cato SASE Cloud Platform's pricing as about five or six out of ten. It's not the cheapest solution, but it is cheaper than Palo Alto and even VeloCloud. We've been working with them for a while and have significant discounts. Our licensing costs vary because we keep adding sites, but it's about 280 per month per site. This includes additional features beyond the base product, starting at around 200."
"The solution's pricing is flexible."
"Cato Networks is an expensive product, but it works out of the box, so that's the usual trade-off, make versus buy. If you decide to buy a product that doesn't require much programming, then you'd want to go for Cato Networks, which will work naturally, and immediately without any complex setup. However, the product is a little bit more expensive than the competitors. On a scale of one to five, I'd rate the pricing for Cato Networks as four."
"You pay yearly based on the speed of your network. If you increase the speed of your network, you increase the cost for your throughput. It is by bandwidth for the most part and then licenses for VPN. There is some per-seat licensing for VPN access, but the majority of it is minimal. It is like $30 a year per client. The rest is based on how much bandwidth you'll use. You pay for that upfront for the year, and if you have to increase it, you increase it, and then they let you send more data through. There are no additional costs in addition to the standard licensing fees."
"The pricing of this solution depends on what you need. It is based on bandwidth."
"I rate the price of Cato Networks a four out of five."
"The platform is expensive."
"This product is not expensive."
"The pricing is fair."
"The pricing is a little bit high but right now, we are okay with it because of the compatibility with Office 365, Teams, and Azure AD."
"We have an educational licensing agreement. It's a customer agreement for multiple years."
"The pricing is in the middle. It isn't too cheap or expensive compared to other antivirus or security products. It is priced according to industry standards."
"I'm not totally involved in the pricing part, but I think its pricing is quite aggressive, and its price is quite similar to Netskope. Netskope has separate licensing fees or additional charges if you want to monitor certain SaaS services, whereas, with MCAS, you get 5,000 applications with their Office 365. It is all bundled, and there's no cost for using that. You only have the operational costs. In the country I am in, it is a bit difficult to get people with the required skill sets."
"We are an MST and we do not pay for the solution. However, the price of the solution could be better."
"Its pricing is on the higher side. Its price is definitely very high for a small-scale company. As an enterprise client, we do get benefits from Microsoft. We get a discounted price because of the number of users we have in our company. We have a premier package, and with that, we do get a lot of discounts. There are no additional costs. It only comes in the top-tier packages. Generally, the top-tier license is the best license that you can get for your organization. If you want, you can buy it separately, but that's not a good idea."
report
Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
865,295 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
11%
Manufacturing Company
9%
Healthcare Company
6%
Computer Software Company
22%
Manufacturing Company
12%
Financial Services Firm
8%
Comms Service Provider
7%
Computer Software Company
14%
Financial Services Firm
11%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with iboss?
For zero trust implementation, we encountered complexity issues, especially with a large infrastructure company Exxon...
What is your primary use case for iboss?
Previously when I used iboss, we did the POC for iboss for ExxonMobil. Four or five people wanted to move from our ol...
What is your experience regarding pricing and costs for iboss?
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern. There are cheaper alte...
What do you like most about Cato Networks?
The solution is a simple WAN solution. We've onboarded the socket on the Cato platform, and it provides connectivity....
What is your primary use case for Cato Networks?
In construction, we have a company in the steel industries, where we are doing the POCs currently, and we have one ex...
What advice do you have for others considering Cato Networks?
I am also a partner with Cato SASE Cloud Platform. Mentioning the bypassing feature and traffic engineering would be ...
Which is the better security solution - Cisco Umbrella or Microsoft Cloud App Security?
Cisco Umbrella is an integral component of the Cisco SASE architecture. It integrates security in a single, cloud-nat...
What do you like most about Microsoft Cloud App Security?
It does a great job of monitoring and maintaining a security baseline. For us, that is a key element. The notificatio...
What is your experience regarding pricing and costs for Microsoft Cloud App Security?
My impression on the pricing, setup costs, and licensing of Microsoft Defender for Cloud Apps is that it's fair. I do...
 

Also Known As

iBoss Cloud Platform
Cato Networks
MS Cloud App Security, Microsoft Cloud App Security
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
Paysafe, AdRoll, Pet Lovers Centre, Arlington Orthopedics, Humphreys & Partners Architects
Customers for Microsoft Defender for Cloud Apps include Accenture, St. Luke’s University Health Network, Ansell, and Nakilat.
Find out what your peers are saying about Cato SASE Cloud Platform vs. Microsoft Defender for Cloud Apps and other solutions. Updated: July 2025.
865,295 professionals have used our research since 2012.