sb-au logo
Story image

Gartner recognises Pulse Secure for Zero Trust Network Access solution

Pulse Secure has been recognised among Representative Vendors in Gartner’s Market Guide for Zero Trust Network Access (ZTNA) released in June 2020.

Pulse SDP provides direct device-to-application trusted connectivity only after successful user, device and security state verification, Pulse Secure states.

In the market guide, Gartner states that ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate.

In addition, security and risk management leaders should pilot ZTNA projects as part of a SASE strategy or to rapidly expand remote access.

Gartner recommends security and risk management leaders responsible for infrastructure security should focus on three key areas.

They should deploy a ZTNA product that relies on multiple contextual aspects to establish and adapt trust for application-level access. Furthermore they should stop relying primarily on IP addresses and network location as a proxy for trust.

Organisations should evaluate the use of a cloud-based ZTNA to offload some use cases if a traditional remote access VPN is experiencing limitations in capacity or bandwidth limitations because of an expanded remote workforce.

Finally, they should choose ZTNA products that integrate with common multi factor authentication (MFA) products to expand identity assurance beyond a single factor, which is an important supplement to the ZTNA principle of context-based adaptive access control.

Pulse Secure’s SDP solution offers enterprises dual-mode VPN and SDP architecture with single-pane-of-glass management and unified policy administration, simplified device coverage and granular, stateful access enforcement.

As a result, organisations have Zero Trust control while working within their existing hybrid IT infrastructure and security ecosystem.

The solution offers dual-mode VPN and SDP architecture that provides enterprises with unified management and operational visibility across public cloud, private cloud, and data centre.

It brings extensive MFA and authorisation options to ensure users, their devices, and the applications they access are verified before and during transactions.

Uniform policy management enables consistently provisioned secure connections, while granular, stateful access enforcement with on-demand, application-level access supports anytime, anywhere access and preferred device use.

Users can access options including web portal, application-activated, single sign-on (SSO), and captive portal, while deployment flexibility enables users to move or extend on-premise implementation through public and private cloud, or with a hosting provider or managed service provider of choice.

Finally, SDP brings reduced total cost of ownership with unified Secure Access platform that works with a customer's existing investment and access ecosystem, the company states.

More broadly, Pulse Secure offers a portfolio of Secure Access solutions and Suites that focus on usability, contextual intelligence and policy orchestration for protected user and device access to resources and applications across data centre and cloud environments.

Pulse SDP extends the company’s foundation of Zero Trust with additional adaptive verify, then trust capabilities, the company states.

Pulse Secure CEO Sudhakar Ramakrishna says, “Enabling users with secure access to applications and resources in Hybrid-IT environments from anywhere, and from any device, is increasingly critical to organizations to ensure productivity and business continuity as they accelerate their digital transformation journeys.

“We are pleased to be acknowledged in the ZTNA market and invite enterprises and resellers to leverage our solutions and to experience how best to significantly enhance enterprise productivity, visibility and compliance with Zero Trust deployment.”

Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Link image
Gartner report: Why SD-WAN is becoming the de-facto option
Network service providers are increasingly challenged by established and new competition in the overlay SD-WAN management as well as in the underlay WAN transport, the report says.More
Link image
Remote working remains a high-risk endeavour
A remote workforce needs phishing protection, automated incident response and security training to avoid the worst from happening. Here's how to get there.More
Link image
Creating a lean business machine with automation and low-code
Forrester data indicates that process automation was a strategic initiative for many organizations before COVID and remains so after. Catch this webinar to learn more about automation.More
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More
Story image
The SASE triangle: How a CASB protects managed apps
Enterprises that fail to adapt to the modern business world when it comes to security are likely to fall prey to data breaches and experience a host of other problems, writes Bitglass product marketing manager Will Houcheime.More