sb-au logo
Story image

Pulse Secure launches new access management and threat mitigation features

23 Oct 2019

Software-defined secure access solutions provider Pulse Secure announced that it has introduced new Secure Access management and threat mitigation capabilities within its Zero Trust Network Access platform.

Through these new features, Pulse Secure aims to enable enterprise and service provider organisations to progress Zero Trust security and mitigate hybrid IT risks while simplifying access to multi-cloud and data centre resources.

“The advantages that vendors like Pulse Secure provide are unified visibility and control, broad endpoint and IoT security coverage, consistent policy enforcement and faster mean time to response to access issues,” says Enterprise Management Associates security and risk management research director Paula Musich.

"This results in an improved security posture and reduced attack surface."

Pulse Secure’s Zero Trust Network Access platform allows organisations to centrally manage policy and automate secure access to applications, data and services that are delivered on-premise or in private and public cloud environments.

The company continues to incorporate open standards and proprietary means to extend platform interoperability and automation that provide customers greater operational oversight, policy management and threat response economies.

Management

Many enterprises supplement conventional desktop and mobile remote access to hybrid IT applications and resources utilising Virtual Desktop Infrastructure.

Having to manage multiple secure access mechanisms often introduces user experience issues, as well as provisioning delays.

Pulse Secure has enhanced its VDI integration with RDS (Remote Desktop Services) Broker to simplify user experience and management support for Citrix XenApp/XenDesktop, VMware Workspace ONE and Microsoft RDP.

Additional management features include:

  • Pulse VPN can now use DHCP-based networking configuration to automate endpoint access provisioning
     
  • OpenStack interoperability to streamline managing multiple virtual Pulse Secure appliances through popular IT orchestration tools
     
  • Easier, broader network switch support for Layer-2 enforcement utilizing a template-based CLI framework for Pulse NAC that negates the need for RADIUS
     
  • Building in Pulse Secure VPN and NAC attributes within Pulse vADC to facilitate policy-based load balancing to improve user experience and access resiliency

Threat Mitigation

Organisations are seeking means to improve the mobile workforce user experience while assuring data protection measures are always active and audit-ready in order to support numerous internal and regulatory compliance specification.

Pulse Secure has updated its Pulse VPN Lockdown mode feature that prevents users from modifying VPN Client settings or disconnecting from gateways.

Ensuring always-on and protected connections with rich user authentication and device security posture enforcement significantly reduces endpoint and access security threats.

Additional threat mitigation enhancements include:

  • Bi-directional integration with IBM QRadar and Splunk SIEMs allowing Pulse NAC to receive SIEM alerts and take network threat response actions
     
  • Identity-based integration between Pulse NAC and the Fortigate Next Gen firewall (NGFW) using RADIUS Accounting allowing Pulse to send identity context to the NGFW for role-based access enforcement to corporate resources
     
  • Pulse NAC can provision users’ authentication details and resource/IoT access enforcement policies to specific Palo Alto Network's NGFW virtual instances (VSYS)
     
  • User Entity Behaviour Analytics (UEBA) enhancements to further extend adaptive access control based on anomalous and malicious user or device activity
Story image
Sophos announces collaboration with Qualcomm for PC security
This unification enables a connected, interactive computing environment that combines smartphone and PC technology to deliver security capabilities and opportunities, the company states.More
Story image
Leader wins Acronis distribution agreement, brings cyber protection solutions to Aus
The agreement covers the entire Acronis Cyber Protect Cloud solution portfolio, which includes cybersecurity, backup, disaster recovery, secure file sync and share, as well as notary services.More
Story image
VPNs and zero trust security don't mix - Zscaler report
93% of organisations surveyed have deployed some kind of VPN, yet 94% know that VPNs are a popular target for cybercriminals.More
Story image
Ping Identity announces appointment of new VP of R&D
In his new role as head of research and development, Burke will be expected to drive product strategy and development across Ping Identity’s entire suite of solutions.More
Story image
Creating a strong culture of security within organisations
CISOs worldwide are inherently aware of how significant investment in cybersecurity strategies and technologies can bolster an organisation’s protection against cyberattacks. However, many overlook the importance of culture when it comes to cybersecurity.More
Story image
Palo Alto Networks turns attention to supporting remote workforces
"We’re working with more organisations to pivot their security architecture and move towards a cloud-delivered security model that can safely connect any user, to any application, from anywhere.”More