Pulse Secure, the provider of software-defined Secure Access solutions, announces its new suite of secure access solutions for hybrid IT that provides organizations a simplified, modular and integrated approach to modernize access productivity, management and Zero Trust control. Pulse Access Suite Plus helps businesses of all sizes and industries consolidate disparate security access tools to gain seamless, secure access to applications and resources from any location, network and device.

According to Enterprise Strategy Group, 36% of enterprises are actively integrating disparate security analytics and operations tools to form a more cohesive security software architecture. CISOs are seeking scalable, intelligent, and automated solutions that can greatly improve security efficacy, operational efficiency, and business enablement.

Architectures and integrated platforms

At the same time, more than half of organizations consider seamless compatibility with their on-premises infrastructure as the most important consideration within their hybrid IT strategy. As such, architectures and integrated platforms will continue to supersede best-of-breed point tools in 2020 to align with the changing security needs of hybrid IT, mobile workers, and IoT device growth.

Pulse Secure’s Access Suite Plus portfolio offers a compelling package that aligns to this procurement trend"

While organizations typically model how ‘best of breed’ solutions align to their requirements, many buying decisions consider the broader value of buying complementary and integrated technologies from a reduced selection of vendors. Pulse Secure’s Access Suite Plus portfolio offers a compelling package that aligns to this procurement trend,” said Jeff Wilson, chief analyst for cybersecurity at Omdia.

Enabling secure access solutions

Pulse Access Suite is a secure access solution set that provides adaptive identity and device authentication, protected connectivity, extensive visibility and analytics, and threat response across mobile, network and multi-cloud environments. By consolidating disparate security access tools into an integrated platform, enterprises gain easy access for users and a single-pane-of-glass to streamline provisioning, management and scalability.

Organizations can centrally orchestrate Zero Trust policy to ensure compliant access to applications, resources and services across distributed network, private cloud and public cloud environments. “Now more than ever, companies must enable Secure Access solutions that enable them to digitally transform their organizations while providing their users simple, secure, and consistent access to their applications and infrastructure regardless of where they are deployed and independent of device and location,” said Sudhakar Ramakrishna, CEO of Pulse Secure.

Secure access functions

With our new Pulse Access Suite Plus, organizations gain more flexibility and capabilities to empower workforce mobility, and quickly scale secure access functions to optimize resources, support new business requirements, incorporate acquisitions, ensure business continuity and meet data protection requirements.”

The Suite brings together a comprehensive secure access portfolio comprised of:

  • Secure remote and cloud access with Zero Trust policy enforcement
  • Multi-factor authentication (MFA) and single sign-on (SSO)
  • Device compliance and mobile device management (MDM)
  • Endpoint and IoT device profiler, and network access control (NAC)
  • User and Entity Behavior Analytics (UEBA) and anomaly detection
  • Application delivery controller (ADC) and Web Application Firewall (WAF)
  • Optimal Gateway Selection (OGS)
  • High availability and business continuity options
  • Pulse One centralized management
  • Experience superior productivity

The Pulse Access Suite Plus also adds numerous new functions into this integrated offering, including: advanced User and Entity Behavior Analytics (UEBA), service level and high availability assurance through virtual Application Delivery Controller, and on-demand emergency capacity coverage.

Cloud and security infrastructure

The Pulse Secure Access Suite, since its launch in 2017, has experienced widespread adoption by our customers representing more than 50% of our new business. The Pulse Access Suite Plus represents an acceleration of this critical initiative to deliver the capabilities and interoperability enterprises and service providers need to remain agile and experience superior productivity, visibility and compliance.” added Sudhakar.

Pulse Access Suite Plus comes in essential, advanced and enterprise editions

Access Suite work with an enterprise’s existing network, cloud and security infrastructure and supports physical, virtual and cloud deployment. The solution supports a broad array of applications; legacy, Cloud and SaaS. With Pulse Access Suite, enterprises realize lower total cost of ownership while attaining procurement, deployment, expansion and support advantages.

Pulse Access Suite Plus comes in essential, advanced and enterprise editions – each edition extends secure access functionality to support hybrid IT access and Zero Trust control. Access Suite are available within annual subscription, licensed by concurrent or named user, with prices starting from $80.00 to $155.00 USD per user per year.

Virtual and cloud configurations

Pulse Secure Appliances, sold separately, are available in physical, virtual and cloud configurations. Pulse Access Suite are sold through a global network of authorized partners and managed service providers.

Pulse Secure is a dedicated and focused vendor that has listened to our needs and created a Suite that fits how we as a channel want to sell Secure Access,” said David Hood, CEO of ANSecurity. “It helps us win more deals and grow our existing customers. In the last year, we have doubled the amount of business we transact with Pulse and our pipeline is consistent. The shift towards the software suites has made it easier for us to close bigger and more profitable deals.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

What’s New with Video Management Systems (VMS)?
What’s New with Video Management Systems (VMS)?

Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analyzing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?

Arteco VCA Applies Deep Learning Analytics To Event-Based Video Management
Arteco VCA Applies Deep Learning Analytics To Event-Based Video Management

Arteco’s VCA video analytics system is their latest new product, signaling a move from machine vision-based analytics to deep learning video analytics. A server – separate from the Arteco video management system (VMS) – manages the algorithms for the analytics. Arteco has been field-testing the product for a year and a half and had planned to launch it officially at ISC West in March (which was postponed). In lieu of the trade show launch, the company has been presenting the product (along with partners) through a series of webinars. The deep learning video analytics product operates out of the box – “just turn it on,” says Steve Birkmeier, Arteco VP of Sales. Functionality is based on “training” of pre-classified objects, such as differentiating between a person, an animal, a vehicle, or just clutter. The deep learning library focuses on people and vehicles. Detection and identification The new system detects everything in the field of view The new system detects everything in the field of view and only identifies what the operator is looking for, thus reducing false alarms. Any identified object is provided with an accuracy reading (e.g., 92% confident it is a human.) The system can be set up from the graphical user interface (GUI). Arteco VCA (video content analysis) also uses analytics rules, such as “if A+B=C, then do D.” Therefore, an abandoned object may elicit a different response than a violated area. With roots in the industrial automation market of the early-2000s, Arteco offers an event-based video management system (VMS) platform. That is, their emphasis is on identifying and providing video at the moment something happens rather than managing a vast amount of video that shows, in effect, nothing of interest. Arteco’s system, providing functionality expected in a full-featured VMS, is designed around the need to react to exceptions and events. Video verification “We can pull in events from any type of system and provide the related video,” says Steve Birkmeier, Arteco VP of Sales. “It can be access control, fire, intrusion, perimeter security, radar or microwave barriers, vape sensors, license plate recognition, or whatever.” An open connector, xml framework enables Arteco to interface with other systems and provide video verification of events. In addition to a focus on event-based video, Arteco also emphasizes ease of use, building on their 20-year history with video analytics. Another point of differentiation is their open architecture that easily and repeatably enables incorporation of third-party “events.” Finally, Arteco’s systems are competitively priced (less expensive), including flexible pricing and licensing structure to maximize value for a customer.  In addition to security, there are multiple operational applications that use video verification In addition to security, there are multiple operational applications that use video verification. For example, integration with warehouse management software using metadata from warehouse surveillance video can provide a searchable database. An operator can enter a purchase order number, for instance, and the system provides video associated with that sale.  The role of video in physical security Arteco has traditionally been a strong player in the utilities vertical, where event-based video management is useful to keep watch on high-value assets located in remote areas with little physical security. Another strong vertical is car dealerships in the United States, including security and loss prevention applications as well as integration with fleet management (using RFID and/or license plate reading). Arteco’s heat mapping capabilities can help a car dealer analyze customer activity to guide merchandising decisions, in the same way a retail store might. Big-box stores are another application for Arteco’s combination of marketing analytics, security and loss prevention.  Arteco’s strength is also proving useful in the emerging, highly regulated cannabis industry. State regulations require that each marijuana plant be tagged, and systems are required to provide total chain of custody records from “seed to sale.” In the case of Arteco, video associated with a specific plant tag is available at each stage of growth, production and sale. Coronavirus and video management The analytics can detect when people are grouped together closer than 2 meters As an Italian company, Arteco has already applied its deep-learning VCA product at city centers in Italy, which was hard hit by the novel coronavirus. The analytics can detect when people are grouped together closer than 2 meters, for example, and can provide an alarm if social distancing requirements related to the coronavirus are not being observed. The system can also detect and confirm the use of face masks at an entrance. Tracking that number – the percentage of customers who comply – in real time might offer additional peace of mind for high-risk customers entering a store, for example. Birkmeier contends the world has been changed forever by the pandemic, although acceptance over time of new technologies being introduced will vary greatly by geographic location. Already, in the last decade or so, acceptance of video surveillance has been greater, even in the U.S. market, he says. ”More often you hear ‘why don’t you have cameras’ rather than ‘I don’t like these camera here,’” he comments.

5G Will Expand Flexibility and Choice in Networks, Decrease Latency
5G Will Expand Flexibility and Choice in Networks, Decrease Latency

The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.