Want a smart insight into your inbox? Sign up for our weekly newsletters to get the only thing that is important to enterprise AI, data, and security leaders. Subscribe now
Investors including Venture Capitalists (VCS) are batting 9 359 million That safe access service will become the basic stability of enterprise security tech stations.
Last week, the Overseas Series G -Round of the KATO network shows that investors consider the sauce to be able to operate significant stability in their basic and adjoining markets. Cato recently reported that it is now worth 8 4.8 billion 46 % Year by Year (YOY) NIGHT In the annual repeated revenue (ARR) for 2024, surpassing the sauce market. Cato Funding will use AI-driving security, accelerate innovation in the cess, expand and respond (XDR), Zero Trust Network Axis (ZTNA), SD WAN, and IOT/OT, and will strengthen its global scaling partner and customer-felling team.
Gartner projects will grow up to 26 %, compound annual growth rate (CAGR) in the Sis Market By 2028.5 28.5 billion.
Likely, the original message is that Cis will do with security steaks that cloud computing did with data centers: Strengthen dozens of point solutions in united platforms. Gartner shows organizations in the latest forecasts for cis worldwide who are in favor of dual vendor’s viewS, sFrom 2028 to 4: 1 ratio to 2: 1, another solid signal that continues to stability.
Cashing on stability
Stabilizing tech stations as a development strategy is no new approach to cybercularity, or broader enterprise software. Cloud-Local Application Protection Platform (cnapp) And Xdr The platform has relied on stability sales for years. Investors leading the latest CATO’s latest era have set their investment dissertation on the proven dynamic that CISOs always find ways to reduce the number of apps to improve the costs and rehabilitation costs.
Venture Bat often heard from Sisos that complexity is one of the largest security enemies. Tool spread is killing the ability to achieve the benefits of phased performance. Although Ceso wants more simplicity and is ready to advance maximum stability, many people have inherited extraordinary complex and high -cost Ligacy Technology Stacks, which is simultaneously complete with a large base of networks and security management tools and applications.
Nakish Arora, chairman and CEO of Paul Alto Networks, acknowledged the effects of stability recently: “Consumers are actually on it. They want stability because they are undergoing the biggest changes so far: a network is not through security change and cloud change, and many of them are not through security.”
A Recent studies In partnership with Palo Alto Networks through IBM found that the average organization has 83 different safety solutions from 29 shopkeepers. The majority of executives (52 %) say complexity is the biggest obstacle to security tasks, and its income can cost up to 5 %. Invalid configurations are common, which makes it difficult to remove the security gap and time. Stabilizing cybersonicity products reduces complexity, the number of apps smooth and improves overall efficiency.
When it comes to taking advantage of stability in a given market, time is very important. Opponents are famous for legacy cows and launching Stay away from the ground (Lotel) Attacks using standard tools to violate and enter networks. Multi -vendor security architectures often have gaps that these and security teams are unaware until the complexity of multi -cloud, proprietary app, and platform integration is not an attempt or violation.
Enterprises lose the ability to save the spread of fermental identities, including cabinets containers and machine and human identification, as each closing point and device is assigned. Closing flaws in infrastructure, app, cloud, identification and network security fuel stability.
What are Sesos saying
Steward Health Skin Siso Esmund Ken advised: “Understand – its actually – the mother -in -law is confident. We’re talking about identity, verification, control and privilege. Start there and then build.”
The Ligacy Network architecture is known for the consumer’s poor experiences and wide safety space. According to Hughes’ 2025 safe network access report45 % of senior IT and security leaders adopt the mother -in -law to stabilize SD WAN and security in a united platform. The majority of organizations, 75 %On just three years ago, more than 29 %, vendors are following stability. The CISO believes that stabilizing their tech stakes will help them avoid lost risks (57 %) and reduce the need to find security specialists (56 %).
“There is an existential threat to all network security companies based on cis devices,” Cato CEO Shlomo Kermer told Venture Bat. “The vast majority of the market will be reflects from devices to cloud service, which means 80 % of the market’s sauce (going).”
A basic construction change is pushing this change. The cis traditionally transforms slide networking and security functions into a single, cloud to local service edge. It has connected SD WAN with important security capabilities, including Secure Web Gateway (SWG), Cloud Axis Security Broker (CASB) and ZTNA, which implement the policy and protect data protection, where users or work burden.

Gartner’s 2024 Magic Quadrant Single Vendor reflects the Cato Networks, Paulo Alto Networks, and Netcope as a leader, their maturity, united platforms and enterprise wide deployment as leaders.
Why the vendor is changing the Enterprise Security Strategy
Single vendor Ces has become a strategic consideration for security and infrastructure leaders. According to Gartner, 65 % The new SD-Wan purchase will be part of a single vendor cyst deployment by 2027, which is more than 20 % in 2024. This anticipated growth reflects a broader change toward the unified platform that reduces policy pieces and improves adventures in users, devices and applications.
In that Magic Quadrant for Single Vendor CesGartner identified Kato Networks, Paulo Alto Networks and Netcope as a market leader, based on various methods of their converters, user experience and enterprise scale deployment models.
Cato’s Karmer told Venture Bat: “There is a short window where companies can avoid being trapped with scattered architecture. The attackers are moving faster than the integration teams. That’s why harmony wins.”
Number Cramar’s Warning Return. AI-Troops are rapidly exploiting the 200 mills of gulfs between the Toll Hand Office in Multi-Vendor Stakes. Every unorganized connection becomes a level of danger.
Compare the sauce leaders
Kato Networks: The Cato Cis Cloud Platform connects SD WAN, Security Service Age (SSE), ZTNA, CASB, and firewall capabilities in a united architecture. Gartner has highlighted Kato’s “average experience above average” than other shopkeepers and noted its “single, straight UI” as an important force. The report states that specific capabilities, including mother -in -law and on -premises firewalling, are still firm. Gartner also notes that pricing can depend on the requirements of bandout, which can affect the total cost, especially about the deployment scale. After its series G and 46 % ARR growth, most of the investors have emerged as a certified net play in the Kato space.
Paulo Allto Networks: PANW “has” strong security and networking features, which are provided through a united platform, “and” “A proven track record in this market, and a large number of users, benefit from the base,” Gartner noted. However, the company’s offer is expensive compared to most other shopkeepers. He also flagged that the new Strata Cloud Manager is less intuitive than his previous UI.
Netcope: Gartner referred to “strong customer experience” and “strong geographical strategy” as well as “strong customer experience” and “strong geographical strategies” as well as “strong customer experience” due to localization and data sovereignty. At the same time, the analysis highlights operational complexity, and notes that “administrators should use multiple consoles to access the platform’s full functionality.” Gartner also says that NetScope does not have experience compared to other shopkeepers.
Evaluating well -known saucer vendors
Flyener | The platform design | Ease in use | AI automation maturity | Priced. | Security circle | Artery fit |
Keto networks | Fully united, localized from the cloud | Excellent | Is moving fast | Predicted and transparent | Desi stack from the end to the end | Mid market and enterprise simplicity seeking |
Paulo Alto Permasa | First integration of security | Moderate | Adult for security | High tco | Strong next -generation firewall (NGFW) and Z TNA | Enterprises already using Palo NGFW |
Netcope | Infrastructure control | Moderate | To improve permanently | Clear and structure | Strong CASB and Data Damage Prevention (DLP) | Regulated Industries and Following compliance |
Cis Stability Signal Enterprise Security Architectural Shift
The wave of mother -in -law shows how businesses are being re -considered to be re -considering security architecture. Single vendor sauce has become necessary for both protection and operational performance, with AI attacks that immediately exploit the merger gap.
The reasoning is straight. Each vendor produces a hand -off danger. Each integration increases delay. Security leaders know that the United States platforms can help eliminate these risks while enabling business speeds.
The CISO is rapidly demanding the same console, the same agent and united policies. The complexity of the multi -vendor is now a competitive responsibility. The sauce stability provides the most important thing with less shopkeepers, strong security and execution at market pace.