Pulse Secure, the provider of software-defined Secure Access solutions, announces its new suite of secure access solutions for hybrid IT that provides organizations a simplified, modular and integrated approach to modernize access productivity, management and Zero Trust control. Pulse Access Suite Plus helps businesses of all sizes and industries consolidate disparate security access tools to gain seamless, secure access to applications and resources from any location, network and device.

According to Enterprise Strategy Group, 36% of enterprises are actively integrating disparate security analytics and operations tools to form a more cohesive security software architecture. CISOs are seeking scalable, intelligent, and automated solutions that can greatly improve security efficacy, operational efficiency, and business enablement.

Architectures and integrated platforms

At the same time, more than half of organizations consider seamless compatibility with their on-premises infrastructure as the most important consideration within their hybrid IT strategy. As such, architectures and integrated platforms will continue to supersede best-of-breed point tools in 2020 to align with the changing security needs of hybrid IT, mobile workers, and IoT device growth.

Pulse Secure’s Access Suite Plus portfolio offers a compelling package that aligns to this procurement trend"

While organizations typically model how ‘best of breed’ solutions align to their requirements, many buying decisions consider the broader value of buying complementary and integrated technologies from a reduced selection of vendors. Pulse Secure’s Access Suite Plus portfolio offers a compelling package that aligns to this procurement trend,” said Jeff Wilson, chief analyst for cybersecurity at Omdia.

Enabling secure access solutions

Pulse Access Suite is a secure access solution set that provides adaptive identity and device authentication, protected connectivity, extensive visibility and analytics, and threat response across mobile, network and multi-cloud environments. By consolidating disparate security access tools into an integrated platform, enterprises gain easy access for users and a single-pane-of-glass to streamline provisioning, management and scalability.

Organizations can centrally orchestrate Zero Trust policy to ensure compliant access to applications, resources and services across distributed network, private cloud and public cloud environments. “Now more than ever, companies must enable Secure Access solutions that enable them to digitally transform their organizations while providing their users simple, secure, and consistent access to their applications and infrastructure regardless of where they are deployed and independent of device and location,” said Sudhakar Ramakrishna, CEO of Pulse Secure.

Secure access functions

With our new Pulse Access Suite Plus, organizations gain more flexibility and capabilities to empower workforce mobility, and quickly scale secure access functions to optimize resources, support new business requirements, incorporate acquisitions, ensure business continuity and meet data protection requirements.”

The Suite brings together a comprehensive secure access portfolio comprised of:

  • Secure remote and cloud access with Zero Trust policy enforcement
  • Multi-factor authentication (MFA) and single sign-on (SSO)
  • Device compliance and mobile device management (MDM)
  • Endpoint and IoT device profiler, and network access control (NAC)
  • User and Entity Behavior Analytics (UEBA) and anomaly detection
  • Application delivery controller (ADC) and Web Application Firewall (WAF)
  • Optimal Gateway Selection (OGS)
  • High availability and business continuity options
  • Pulse One centralized management
  • Experience superior productivity

The Pulse Access Suite Plus also adds numerous new functions into this integrated offering, including: advanced User and Entity Behavior Analytics (UEBA), service level and high availability assurance through virtual Application Delivery Controller, and on-demand emergency capacity coverage.

Cloud and security infrastructure

The Pulse Secure Access Suite, since its launch in 2017, has experienced widespread adoption by our customers representing more than 50% of our new business. The Pulse Access Suite Plus represents an acceleration of this critical initiative to deliver the capabilities and interoperability enterprises and service providers need to remain agile and experience superior productivity, visibility and compliance.” added Sudhakar.

Pulse Access Suite Plus comes in essential, advanced and enterprise editions

Access Suite work with an enterprise’s existing network, cloud and security infrastructure and supports physical, virtual and cloud deployment. The solution supports a broad array of applications; legacy, Cloud and SaaS. With Pulse Access Suite, enterprises realize lower total cost of ownership while attaining procurement, deployment, expansion and support advantages.

Pulse Access Suite Plus comes in essential, advanced and enterprise editions – each edition extends secure access functionality to support hybrid IT access and Zero Trust control. Access Suite are available within annual subscription, licensed by concurrent or named user, with prices starting from $80.00 to $155.00 USD per user per year.

Virtual and cloud configurations

Pulse Secure Appliances, sold separately, are available in physical, virtual and cloud configurations. Pulse Access Suite are sold through a global network of authorized partners and managed service providers.

Pulse Secure is a dedicated and focused vendor that has listened to our needs and created a Suite that fits how we as a channel want to sell Secure Access,” said David Hood, CEO of ANSecurity. “It helps us win more deals and grow our existing customers. In the last year, we have doubled the amount of business we transact with Pulse and our pipeline is consistent. The shift towards the software suites has made it easier for us to close bigger and more profitable deals.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

How To Use Threat Intelligence Data To Manage Security In The Age Of COVID-19
How To Use Threat Intelligence Data To Manage Security In The Age Of COVID-19

COVID-19 has already had a huge impact on the global economy. According to Statista, GDP growth globally will drop from around 3% to 2.4% - equivalent to a drop of around $35 trillion worldwide. In sectors like oil and gas, the impact is particularly acute: IHS Markit predicted that the reduction in oil consumption due to COVID-19 has led to a first-half surplus of 1.8 billion barrels of crude oil. The macroeconomic trends around these worldwide sectors point to harsher economic conditions and recession. For companies in the oil and gas sector running complex operations around the world, this will lead directly to tougher trading environments and a lot of necessary belt-tightening when it comes to costs around operations. Indirectly, the potential recession could cause more civil unrest and security threats for them as well. To cope with these potential challenges, companies will have to look at how they can maintain security for their operations and prevent risks as much as possible. Taking a contextual approach to physical security With these two goals in mind, looking at threat intelligence data should be considered. Threat intelligence refers to a set of data that can be used to judge current and future trends around risks, from everyday crime or political changes through to larger events like civil unrest, terrorism or the current pandemic. Based on data around these issues, companies can make better decisions on how they invest and manage their security posture in advance. Behind this overall approach, however, there are a significant number of moving parts that have to be considered. This includes where the data comes from, how it is used, and who is using the data. Companies can make better decisions on how they invest and manage their security posture The first consideration for threat intelligence is where data comes from. Typically, companies with large oilfields or refinery operations will have large investments in physical security to protect these environments, and part of this spend will include intelligence on local market, political and security conditions. Using this forecast data, your security leadership team can ensure that they have the right resources available in advance of any particular problem. This data can come from multiple sources, from social media data and crowdsourced information through to government, police and private company feeds. This mass of information can then be used to inform your planning and decision making around security, and how best to respond. However, one issue for oil and gas companies with distributed operations is how much data they have to manage over time. With so many potential sources of information all feeding back in real time, it’s hard to make sense of what comes in. Similarly, companies with international teams may have different sets and sources of data available to different parts of their organizations - while each team has its own view of what is going on, they may be missing out on contextual data from other sources held by neighbouring teams or by the central security department. Without a complete picture, it is easy to miss out on important information. Making threat intelligence smarter To solve this problem - and to reduce the costs around managing threat intelligence data - centralizing your approach can make it easier to provide that context to all your teams and stakeholders. Rather than letting each team set up and run their own threat intelligence approach, centralizing the data and letting each team use this can reduce costs. More importantly, it can improve the quality of your threat intelligence approach overall. By applying a combination of algorithms and security analysts to evaluate threat intelligence centrally, you can improve the quality of the data that you have coming into the organization in the first place. This approach provides higher quality data for decision making. However, a centralized approach is not enough on its own. Local knowledge and analysis is always useful. Consequently, alongside any centralization approach you have to have better filtering and search capabilities, otherwise you risk teams not being able to get the information that is particularly relevant and timely to them. This approach of bringing together centralized management of data feeds with more powerful tools for local teams to find what they want and get that access in real time represents the best of both worlds. Planning ahead Scenarios vary from a best case return to pre-crisis revenues of $50 to $60 per barrel by 2021 or 2022 According to consultancy firm McKinsey, the oil and gas sector faces an enormous challenge over the next few years. Scenarios vary from a best case return to pre-crisis revenues of $50 to $60 per barrel by 2021 or 2022, through to a worst case scenario where demand never returns and the industry has to undertake managed decline around some assets and look for new market opportunities in others. Whatever scenario plays out in the real world, security for existing assets will be a continued requirement. Planning ahead using threat intelligence data will be essential whatever happens. To help reduce costs and improve data quality, centralizing this approach will help. Without this mix of global oversight and local detail, companies will find their operations hampered and wrong decisions are made. It’s only by applying threat intelligence data in the right context that security teams will be able to keep up with the challenges of the future.

What Are the Security Challenges of the Oil and Gas Market?
What Are the Security Challenges of the Oil and Gas Market?

Protecting the oil and gas market is key to a thriving economy. The list of security challenges for oil and gas requires the best technology solutions our industry has to offer, from physical barriers to video systems to cybersecurity. We asked this week’s Expert Panel Roundtable: What are the security challenges of the oil and gas market?

Lessons Learned With AxxonSoft: How Have You Adapted To The COVID-19 Pandemic?
Lessons Learned With AxxonSoft: How Have You Adapted To The COVID-19 Pandemic?

The coronavirus pandemic has brought about an unprecedented crisis for businesses and individuals. It has also created a new normal, notwithstanding the disruption to our lives, ultimately changing life as we knew it. However, our resilience as humans will ensure that we survive and become better, stronger, and more determined than ever before. As I mentioned, both businesses and individuals have struggled significantly to balance the need for safety versus survival. But at AxxonSoft, we remain committed to keeping our people safe, while ensuring that our support and commitment to our clients are not compromised. Ensuring business continuity At AxxonSoft, our vision has always been to ensure business continuity through enhanced safety and video surveillance offerings. Adhering to the COVID-19 regulations, we are prescribing to social distancing to slow the spread of the virus. As such, we are utilising this time to ensure that our service offering is optimized to afford our clients the ability to repurpose and extend their remote working viabilities. As an essential service provider, we have ensured that we are providing the right tools to our clients to comply with regulations. Our video analytics and face recognition services have no reliance on on-site control rooms and, therefore, clients’ security solutions and personal safety are not compromised. Innovation reimagined During these precarious times, our focus remains on support and service. Our development team continues to work tirelessly to ensure that you can use our software during the lockdown and have accelerated innovation to this end. While we must maintain social distancing, we can and will still be of service to our community Therefore, we are proud to present version 4.11 of the Intellect PSIM, which offers our clients a neural network-based analytical tracker which recognises specific types of objects, such as humans and vehicles. We have also equipped this version with video wall management interface, automatic object tracking and a web reporting subsystem. Behavioral analytics generates data by detecting specific postures, like crouching, shooting or any potentially dangerous scenario. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement, offering a comprehensive bird’s-eye view to clients. This upgrade also upholds mandated social distancing measures and keeps any face-to-face meetings to a minimal. The silver lining is that you can even use this technology when the pandemic is over. Now that’s what I call experiencing the next with AxxonSoft! Finding solutions to the challenges Our specialist technology and frontline technical support staff will ensure that your business is protected during and post-lockdown. We will continue to ensure that we provide solutions to the new challenges that the coronavirus brings, ensuring that our clients can emerge stronger and more responsive to any changes in the future. Our surveillance software operates on a three-pronged approach: calibration, detection and measurement While we must maintain social distancing, we can and will still be of service to our community. After all, change is not just about technology but about mastering mindsets. The COVID-19 disaster has demanded that businesses embrace tech disruptions as early as possible and apply technology in imaginative ways to define the new world of work. Until next time, stay safe!