sb-as logo
Story image

Pulse Secure launches new access management and threat mitigation features

23 Oct 2019

Software-defined secure access solutions provider Pulse Secure announced that it has introduced new Secure Access management and threat mitigation capabilities within its Zero Trust Network Access platform.

Through these new features, Pulse Secure aims to enable enterprise and service provider organisations to progress Zero Trust security and mitigate hybrid IT risks while simplifying access to multi-cloud and data centre resources.

“The advantages that vendors like Pulse Secure provide are unified visibility and control, broad endpoint and IoT security coverage, consistent policy enforcement and faster mean time to response to access issues,” says Enterprise Management Associates security and risk management research director Paula Musich.

"This results in an improved security posture and reduced attack surface."

Pulse Secure’s Zero Trust Network Access platform allows organisations to centrally manage policy and automate secure access to applications, data and services that are delivered on-premise or in private and public cloud environments.

The company continues to incorporate open standards and proprietary means to extend platform interoperability and automation that provide customers greater operational oversight, policy management and threat response economies.

Management

Many enterprises supplement conventional desktop and mobile remote access to hybrid IT applications and resources utilising Virtual Desktop Infrastructure.

Having to manage multiple secure access mechanisms often introduces user experience issues, as well as provisioning delays.

Pulse Secure has enhanced its VDI integration with RDS (Remote Desktop Services) Broker to simplify user experience and management support for Citrix XenApp/XenDesktop, VMware Workspace ONE and Microsoft RDP.

Additional management features include:

  • Pulse VPN can now use DHCP-based networking configuration to automate endpoint access provisioning
     
  • OpenStack interoperability to streamline managing multiple virtual Pulse Secure appliances through popular IT orchestration tools
     
  • Easier, broader network switch support for Layer-2 enforcement utilizing a template-based CLI framework for Pulse NAC that negates the need for RADIUS
     
  • Building in Pulse Secure VPN and NAC attributes within Pulse vADC to facilitate policy-based load balancing to improve user experience and access resiliency

Threat Mitigation

Organisations are seeking means to improve the mobile workforce user experience while assuring data protection measures are always active and audit-ready in order to support numerous internal and regulatory compliance specification.

Pulse Secure has updated its Pulse VPN Lockdown mode feature that prevents users from modifying VPN Client settings or disconnecting from gateways.

Ensuring always-on and protected connections with rich user authentication and device security posture enforcement significantly reduces endpoint and access security threats.

Additional threat mitigation enhancements include:

  • Bi-directional integration with IBM QRadar and Splunk SIEMs allowing Pulse NAC to receive SIEM alerts and take network threat response actions
     
  • Identity-based integration between Pulse NAC and the Fortigate Next Gen firewall (NGFW) using RADIUS Accounting allowing Pulse to send identity context to the NGFW for role-based access enforcement to corporate resources
     
  • Pulse NAC can provision users’ authentication details and resource/IoT access enforcement policies to specific Palo Alto Network's NGFW virtual instances (VSYS)
     
  • User Entity Behaviour Analytics (UEBA) enhancements to further extend adaptive access control based on anomalous and malicious user or device activity
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Link image
How to leverage backup best practices to repel ransomware
Here's how a ransomware kit with a whitepaper, webinar and 30 day free trial can help your business effectively prevent, detect and restore from a ransomware attack.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Gartner: Security leaders must balance risk, trust and opportunity
Security and risk leaders must focus on balancing risk, trust and opportunity to help maintain the ability of their organisations to function.More