Pulse Secure, the renowned provider of software-defined Secure Access solutions, announced the launch of Pulse Zero Trust Access (PZTA), a cloud-based, multi-tenant secure access service that enables organizations to provide users easy, anywhere access to multi-cloud and data centre applications with Zero Trust assurance. PZTA simplifies access management with single-pane-of-glass visibility, end-to-end analytics, granular policies, automated provisioning, and advanced threat mitigation that empowers organizations to further optimize their increasingly mobile workforce and hybrid IT resources. As enterprises advance workforce mobility and business digitization, users require access to on-premises and cloud applications from any device, from any location, and at any time. Trust and adaptive control Meanwhile, cyberattacks, data breaches and compliance obligations have grown significantly, making trust and adaptive control critical. PZTA offers users streamlined application access while allowing organizations to govern every request by automatically verifying identity, device and security posture before granting a direct, encrypted connection between that user's device and applications residing in public clouds, private clouds or data centers. IT leaders are driving business transformation in the hybrid digital era while also defending assets" “IT leaders are driving business transformation in the hybrid digital era while also defending assets during the ‘age of hyper-converged access’ - for any user, from any device, anywhere to any application, at any time. Pulse Zero Trust Access is designed for the elastic digital workplace, providing a unified, cloud-based service that enables greater accessibility, efficiency and risk reduction,” said Rohini Kasturi, Chief Product Officer at Pulse Secure. Maximizing deployment flexibility “From inception, Pulse Secure has focused on providing secure access solutions that enhance productivity, visibility and compliance as companies migrate to the cloud and take advantage of utility computing. PZTA exemplifies our on-going commitment to innovate while maximizing deployment flexibility, scale, interoperability and investment protection for companies of all sizes.” PZTA is based on Pulse Secure’s new cloud-native, microservices-based, multi-tenant platform deployed globally in Microsoft Azure Cloud. The PZTA service consists of the Pulse ZTA Controller, which is hosted and managed by Pulse Secure, the virtual Pulse ZTA Gateway that customers deploy on-premises or in the cloud, and the unified Pulse ZTA Client which runs natively on each user’s Microsoft Windows, Apple macOS and iOS, and Google Android device. Adaptive control advantages According to the Gartner Zero Trust Network Access (ZTNA) market guide: “ZTNA improves the flexibility, agility and scalability of application access, enabling digital businesses to thrive without exposing internal applications directly to the internet, reducing risk of attack.” Further, “ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. Security and risk management leaders should pilot ZTNA projects as part of a SASE [Secure Access Service Edge] strategy or to rapidly expand remote access.” Pulse ZTA Gateways are deployed in the customer’s on-premise and cloud environment Pulse Zero Trust Access aligns with the Software Defined Perimeter (SDP) architecture of the Cloud Security Alliance, incorporating extensive identity and device authentication, separate control and data planes, centralized granular policy management, and micro-segmentation to thwart unauthorized access and attack propagation. Threat mitigation actions While every user device access requires explicit authentication and authorization by the Pulse Zero Trust Access service, the Pulse ZTA Gateways are deployed in the customer’s on-premise and cloud environment closest to the application or resource. This proximity optimizes user experience, reduces latency, and enables hybrid IT deployment at scale. Since encrypted application traffic only flows between the ZTA Clients and ZTA Gateways, customers gain full data privacy and data sovereignty. PZTA governs each access request and session via a centrally deployed and managed policy. Building upon Gartner’s Continuous Adaptive Risk and Trust Assessment (CARTA) framework, PZTA augments contextual and identity-centric policies with built-in User and Entity Behavior Analytics (UEBA) whereby attributes for every session are monitored and assessed, applying proprietary risk scoring algorithms to identify non-compliant, malicious and anomalous activity, and take expedited threat mitigation actions. Cloud-based service “Our customers trust us to identify and deliver advanced solutions that enable their digital business and protect their valuable resources. Pulse Secure has been our key partner for many years as they offer one of the most versatile, integrated and scalable secure access solutions in the market." PZTA can co-exist with Pulse Secure’s network access solution portfolio including the Pulse Access Suite "We jumped at the opportunity to test out their new Zero Trust Access cloud-based service and our teams have been impressed with its simplicity, manageability and overall feature-set”, said Herve Rousseau, the Chief Executive Officer at Openminded. “Pulse Zero Trust Access service does indeed offer users an easier means to access network and cloud applications while providing organizations greater hybrid IT access agility, oversight and management.” Secure access solution PZTA allows enterprises of any size to gain comprehensive Secure Access with a simple, scalable, cloud-native service that can be implemented in a matter of hours. The solution provides deployment flexibility and cohesive policy management for enterprises migrating applications from data center to cloud, while also offering comprehensive secure access capabilities to those organizations with pure multi-cloud environments. This allows broad support for legacy applications and popular cloud apps such as those from Amazon, Atlassian, Box, Google, Microsoft, Oracle, Salesforce, SAP and Zoom. PZTA can co-exist with Pulse Secure’s remote, mobile and network access solution portfolio including the Pulse Access Suite. Multi-factor authentication Leveraging the unified, multi-tunnel Pulse ZTA Client, users can enjoy transparent, uninterrupted, and simultaneous access to applications and resources from their device of choice regardless of access method - SDP, VPN or NAC. Organizations gain implementation and operational efficiencies, investment protection and tool consolidation to realize lower overall cost of ownership. Additional features of PZTA include: Extensive identity, endpoint and security posture authentication prior and during each access transaction to negate unauthorized user and vulnerable device access Broad application support, including HTTP, TCP/UDP based applications, multi-factor authentication (MFA), single sign-on (SSO) and protected connectivity options User and device resource shielding prior to PZTA Controller authorization, establishing a Dark Cloud defense to eliminate target visibility for attackers and malware propagation End-to-end analytics to expedite alerting, reporting, auditing, issue triage, and investigation processes Hybrid IT deployment According to a 2020 Zero Trust Progress Report, more than half of cybersecurity decision makers (53%) plan to adopt Zero Trust access capabilities with a hybrid IT deployment. PZTA service is available now at an annual subscription MSRP starting at $180 per user for up to 500 users with volume and multi-year discounts being offered. Managed Security Service Providers (MSSPs) can take advantage of flexible deployment options with plans to allow MSPs to host the ZTA Controller in their or their customers’ infrastructure, and the ZTA Gateways across any hybrid environment.
Pulse Secure, the provider of software-defined secure access solutions, announced that Rohini Kasturi is joining the executive team as chief development officer, where he will be responsible for worldwide engineering and solutions. “We are totally committed to continuing to excel as an industry-leading technology company which offers the best secure access solutions for people, devices, things and services,” said Sudhakar Ramakrishna, CEO of Pulse Secure. “We are delighted to welcome Rohini on board to lead the company’s global efforts in developing our products and solutions to meet the evolving requirements of our customers and partners. Rohini is an entrepreneur with significant experience in scaling teams and businesses and we look forward to leveraging his expertise to deliver superior customer experiences.” Leadership Positions Prior to taking up his new role at Pulse Secure, Rohini Kasturi was a VP/GM at Veritas where he oversaw its information management portfolio and led engineering, product management, and business development. While at Veritas, Rohini’s team launched the multi-cloud data and information management platform and apps ecosystem. Rohini has also held roles at Avni, where he was the founder and CEO, creating the industry’s first Hybrid Cloud Platform, as well as various leadership positions at Juniper, Cisco and Motorola. In February, Pulse Secure announced new Software Defined Perimeter (SDP) functionality Secure Access Portfolio The appointment of Rohini Kasturi as Pulse Secure’s new chief development officer is reflective of the company’s focus on advancing its secure access portfolio, which delivers protected connectivity, operational intelligence and threat response across mobile, network, and multi-cloud environments to provide easy, compliant access for end users and single-pane-of-glass management for administrators. In February, Pulse Secure announced new Software Defined Perimeter (SDP) functionality that complements its integrated solution set by offering direct device-to-application/resource secure connectivity only after successful user, device and security state verification including geo location and behavior-based anomaly detection. IT Security Needs “Today’s enterprises face a range of challenges in ensuring secure access to their infrastructures and applications due to widespread mobility and the growing trend of digital transformation,” commented Kasturi. “Now more than ever, businesses are looking to companies like Pulse Secure to help them with their IT security needs and I am excited to join the team at such a pivotal time in its development as it experiences continued growth and global success.”
Automatic Vehicle IdentificationDownload
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload