Category Archives: Pulse Secure

  • 0

Buy one appliance and get the second one free

Category : Pulse Secure

Modernize your enterprise VPN with the latest Pulse Secure appliances, software and services at a reduced cost and empower your workers with the trusted secure access that 20,000 customers know and love. Secure the future today to deliver and scale new IT services tomorrow.

A free PSA5000 or PSA7000 when you buy the same appliance with the Pulse Access Suite.

Buy the Advanced or Enterprise Suite Editions and you can extend this buy-one-get-one-free offer to platform options such as license server software (with member licenses) or ICE (in case of emergency) licenses.

*This offer is only available for the PSA5000 and PSA7000 with a minimum purchase of Pulse Access Suite licenses per hardware pair. Find the complete terms and conditions here.

If interested  CONTACT US!

  • 0

6 Dangerous Misconceptions about Network Security

Category : Pulse Secure

When assessing or implementing network security, misconceptions can be dangerous, leading your company’s data to be at risk and, with it, your reputation, your revenue, and possibly your business. With that in mind, be on guard against these six insidious misconceptions:

1. Threats only come from the outside. This is a common misconception, but the truth is that most infiltration issues and security breaches happen from inside the network. While this could be due to a malicious employee, most often it is simply the result of ignorance. For example, an employee may bring his own device and use it for work – but it is unsecured. Another person may have a hub sitting underneath her desk to which she connects multiple machines – some of which are personal. You must have a diligent secure access strategy in place that includes internal security compliance to prevent such security risks.

2. Our employees would never fall for a phishing scam.Yes, they would. And they do. Phishing is very sophisticated nowadays, with spear phishing campaigns that are personalized and tailored to a specific individual. Even a savvy employee can fall prey to an email that looks and sounds authentic.

3. Network access control (NAC) is too difficult to use.Five years ago, that may have been the case. NAC was hard to understand, tough to implement, and irritating for the end user. With business trends evolving to support initiatives like BYOD and IoT, however, network access control has also adapted to meet such demands. For example, Pulse Secure’s NAC solution, Policy Secure, is streamlined, simplified, and user-friendly. You can easily profile your network and get a clear picture of exactly what is residing on it and connecting to it, both internally and externally. Plus, you can gain full visibility into which people and devices have access to what data.

4. Our firewall checks everything. It may – but the danger of using VPN components that are offered by next-generation firewalls is that they don’t always perform enough checks. Contrast that with a Pulse security solution that validates software patches, apps, and other elements through host-checking capabilities prior to allowing them on the network as well as during connections, and you’ve got yourself a fast and reliable secure access solution that will protect your company’s data yesterday, today, and tomorrow.

5. The cloud is secure. We want to believe this, but it’s not that simple. The cloud is where everything is going; in essence, we are moving to huge server farms hosted by large organizations such as Google or AWS, and their primary product offering is space, processing power, and bandwidth – not security. That is their niche and their expertise. To protect that space, you must look to the secure access experts for the best security platform solutions that can be deployed across hybrid IT environments.

6. Our security is good enough. This is the biggest and most dangerous misconception of all: companies assume that if their security was good enough last year or three years ago, it is good enough today … even if it hasn’t been updated in recent history. So, before you say, “Our security is good enough,” ask yourself: are you willing to bet your business on that? Ransomware can get through VPNs or open ports outside the network, potentially encrypting your entire network. Don’t jump onto this bandwagon too fast: your network security could be on the line.

Maybe yesterday’s network security isn’t good enough. If you’re serious about security, it’s time to do some serious security upgrades.

Learn more about the importance of upgrading hardware here.


Author: Jeremy Allen

  • 0

Lives Are on the Line with IoMT in Healthcare

Category : Pulse Secure

A patient lies on his bed. A furrow of concern crosses his brow. He presses the call button and a nurse arrives. She checks his heart monitor, assures the patient that all is well, and leaves. An hour later, the patient goes into cardiac arrest. This could have been prevented if the heart monitor had shown the correct information – but it didn’t. As part of the Internet of Medical Things, the heart monitor malfunctioned due to an external cyberattack.

In general, the Internet of Things (IoT) causes people concern because they are worried about their personal data being breached and sold. The serious nature of identity theft, credit card fraud, and stolen funds cannot be minimized. But when it comes to the Internet of Medical Things (IoMT), the stakes are even higher: lives are literally on the line.

Today’s hospitals and healthcare systems are tremendously complex, with medical devices connected to networks that house patient data. The lure of this personally identifiable information (PII) makes healthcare organizations a major target for hackers, as seen in the recurring headlines of hospital breaches. But healthcare organizations must take into consideration the physical dangers, too. For example, if ransomware shuts down critical medical devices or inhibits the transmission of data to and from these devices, patients’ lives are endangered.

To counter sophisticated threats that involve the IoMT, healthcare organizations need to employ a three-fold plan:

  1. Get a Clear View of All Devices

Visibility is the first critical step. An estimated 10% to 20% of medical devices in hospitals are connected, and that number is growing rapidly.[1] All connected devices need to be identified so that each one can be protected.

  1. Set – and Enforce – the Rules

Once visibility is established, security policies can be instituted based upon device categories. For example:

  • Does the device require access to the data center? If data is being pushed to or pulled from the data center, the device is a prime target for hackers.
  • Does the device sustain human life? Devices that play a critical role in sustaining life require strong security policies to protect patients.
  • Is the device easy or hard to exploit? Unfortunately, many older devices are extremely easy to exploit. They may not even have password protection. Such devices need security policies – and, often, risk remediation – to counter their vulnerabilities.
  • Who requires access to the data being collected? Policies may dictate that a medical technician can only access basic data from a certain device, whereas a doctor may be granted access into a patient’s information.

Policies should be set at the granular level and rigorously enforced with both the business and patient in mind.

  1. Be Cryptic

Securing medical devices is not enough: data in transit must also be secured through strong encryption. For example, a VPN or SSL tunnel can be used to secure data on the wire as it travels to or from an IoMT client or server. Without encryption, data can be breached while it is in motion, with ramifications for both healthcare systems and patients.

It is not a scare tactic to say that lives are on the line with IoMT in healthcare. It is a simple statement of fact. But with visibility, security, and encryption in place, hospitals and healthcare organizations can protect both the data, the health, and the lives of the patients who rely on them most.

Healthcare organizations worldwide are choosing Pulse Secure for their secure access solutions.

Check out our latest healthcare customer success video below.

[1] The Healthcare Information and Management Systems Society (HIMSS)


Author: Ganesh Nakhawa

  • 0

4 Ways vADC Can Transform Your Business

Category : Pulse Secure

Chances are, your company has a hybrid IT environment composed of a traditional data center, a cloud infrastructure, virtual environments, remote services, mobile access, and legacy systems. You have undoubtedly discovered that providing secure access and connectivity between any user and any device to any kind of service is – to put it mildly – a challenge.

However, delivering secure access solutions for people, devices, things, and services is our mission at Pulse Secure which means we are up for the challenge. We recently acquired Brocade’s virtual application delivery controller (vADC) solution to augment the Pulse product portfolio and offer a secure access platform and comprehensive secure access solution.

A virtual application delivery controller can transform your business by extending the footprint of secure access in four key ways:

1. Secure access for enterprise applications
Whether your remote users are sitting in an airport or giving a presentation to a potential customer, they need access to your classic SharePoint or Office-based applications, as well as to your CRM or ERP systems such as SAP, WebDAV, or Salesforce. vADCgives you end-to-end secure access to all enterprise applications in a highly-scalable solution that incorporates best-in-class role-based access control. With “triple-A” functionality, you have the Authentication, Authorization, and Audit capabilities that are crucial for securing your enterprise applications.

2. Secure access to consumer-facing web applications
Secure access is not limited to your company users. Because Pulse vADC has a world-class virtual web application firewall, you are able to extend secure access to consumer-facing web applications. Therefore, as you deliver virtual services to your customers, you can have confidence that your network – and your customers – will remain secure at all times, protected from cyberattacks.

3. Local and global load balancing
As you adopt a software-defined data center architecture, your data center becomes highly distributed. Local and global server load balancing is crucial to maintain both performance and security across the network.

Pulse Secure’s vADC delivers intelligent load balancing at both the local and global levels for highly-scalable and highly-secure solutions. Suppose you have several network gateways located in North America and Asia-Pacific. A user who normally lives in San Jose, California travels to Singapore. The vADC will note where the user is currently located and where the nearest services are located. Instead of routing the user’s connectivity back to the San Jose gateway (the usual connection), it will make the switch to the Singapore gateway – enhancing the user experience with optimal performance.

4. Accelerates momentum into cloud platforms
You likely have services running in the cloud, or have adopted SaaS services as part of your IT infrastructure. Through the Pulse vADC, you can extend your platform to provide seamless, secure access to your cloud infrastructure. Single sign-on capability ensures a frictionless user experience while simplified administration lets you centrally manage access policies for SaaS, cloud, and data center applications and services.

Your hybrid IT environment – no matter how complex, distributed, and extensive – doesn’t have to cause you security concerns. Pulse vADC solutions provide fast, reliable application delivery across your virtual and cloud platforms at massive scale. So now the question is, are you ready to transform your business with vADC?


Author: Prakash Mana

  • 0

Frost & Sullivan Define How Pulse Secure is Differentiated in the NAC Global Market

Category : Pulse Secure

Larger technological developments have made NAC solutions an essential part of network security with revenues expecting to increase by 30.7% YoY. An exceptional NAC solution provides a comprehensive network security platform that enables endpoint visibility and contextual awareness. Are you getting full comprehensive insight into your network and if not, how can you find an exceptional NAC solution to deploy across your corporate network?

In this Frost & Sullivan NAC Market Research Report:

  • Discover what technological developments are making NAC essential to network security
  • Find out the key factors driving NAC sales and how this provides unique value to customers
  • Learn how Pulse Secure’s NAC solution, Pulse Policy Secure, offers the most comprehensive network security platform in the market

  • 0

To Upgrade or Not to Upgrade Your Hardware, that Is the Question

Category : Pulse Secure

When you think of security, you probably think “software” first. But software runs on hardware, and if your network security and access appliances are aging, your security profile may be crumbling – without you being aware of it.

Your network security and access appliances sit at the edge of your network, determining who can be let into the network and how much access they should be given. Since security threats are evolving by the day, these appliances need up-to-date software to appropriately protect your company and users from harm. But have you considered the vulnerabilities of outdated hardware appliances? If your appliances are three or four generations old, the latest software versions are likely not compatible with your hardware, so you’re left running out-of-date software.

This leaves you with two choices:

  • Upgrade your hardware so that you can get the latest software to maintain robust protection, or,
  • Keep your current hardware and entrust the security of your network to out-of-date software.

Frequently, companies choose the latter option. After all, their hardware appears to be working, so why upgrade it? An admin may think, “As long as my end users aren’t calling me to complain, everything must be working fine.” Unfortunately, “working” does not equal “secure.” For example, suppose you use OpenSSL for your backend services. Over the past few years, OpenSSL has identified several vulnerabilities. Hackers know this, so they look for devices running older versions of OpenSSL to exploit. At Pulse Secure, we monitor for such events and quickly provide patches in our software updates. But if your appliance can’t run the latest security software and you’re using an older version of OpenSSL, you are wide open to an attack.

That is just one example among the hundreds and thousands of enhancements and updates constantly being created to address new risks, threats, and vulnerabilities.

Aging hardware is also a risk because it will ultimately fail at some point. That is a generally-accepted principle when deploying hardware: there is a mean time between failures. It is why equipment is only guaranteed for a certain number of years. After that, the likelihood of failure becomes statistically high.

Aging hardware therefore presents a double risk: you may suffer a breach because of out-of-date security software, and you might completely lose functionality because of equipment failure. Both eventualities will leave you scrambling to repair the damage. The good news is, you can prevent a catastrophic situation by being proactive in upgrading your network security and access appliances.

Upgrading hardware not only prevents security breaches, but it also brings quantifiable value to daily business operations. For example, at Pulse Secure, our security software updates include new features to make deployment easier through wizards – so what took 30 steps before may take just five now. By minimizing the clicks, we streamline administrative tasks, saving you both time and money.

Plus, with every new generation of hardware comes leading-edge components: memory, processors, hard disks, network interface cards, etc. New hardware can handle more users and manage traffic faster and more reliably than ever so you can do more with less.

Take a hard line when it comes to upgrading your hardware. You will gain increased security to meet today’s sophisticated threats, reduce your network complexity, improve productivity, enhance the user experience, and lower your bottom line costs. The only thing you lose is the experience of getting hacked … and we can all do without that.


Author: Stephanie Briggs

  • 0

A new vADC chapter is written

Category : Pulse Secure

A new chapter for a visionary disruptor:

Today, the vADC team gets to write a new chapter in the life of a product line they love, it’s the next big step in the exciting journey of building the best vADC on the market. We’re now settling in to our new home at Pulse Secure, and we couldn’t be happier.

Pulse Secure is a market-leading secure access company moving aggressively with a single mission to deliver “Secure Access Solutions for People, Devices, Things and Services”. Adding the vADC capabilities to the portfolio not only further strengths the ability to deliver the most complete secure access platform but is also meets the perfect intersection of security, cloud, and vADC.

I am personally enthusiastic about turning this page and about transitioning across as General Manager of the vADC business at Pulse Secure.

I’m excited for three main reasons. People, Product and Strategy.

People: I have had the great pleasure of working with great people, from management to brilliant individual contributors on the vADC team at Brocade. We have incredible engineers, product management, marketing and sales people. Making this move, I get to continue working with that global team, and I am fortunate enough to now include the Pulse team to that list of teammates.

Under Sudhakar Ramakrishna’s leadership, Pulse Secure has thrived and seen repeated, continuous growth by simply executing well. The people at Pulse have successfully grown the business to include over 20,000 customers, develop a customer service organization that is best in class, delivering Net Promoter Scores (NPS) surpassing the world class 40 mark, representing the top 25% of all software companies. – Pulse has grown revenue and profitability consistently, all while fostering a collaborative, can-do culture.

Product: Our vADC product has long been viewed as visionary, not just in a magic quadrant kind of way, but truly in the customer’s eyes. That is why we have won customers such as China Mobile and Pernod Ricard. Looking back is not enough though, finding a home where we can thrive at innovating means our product will not only remain a leader in today’s migration from Mode 1 to Mode 2, but also that it will be the platform for tomorrow’s micro-services hybrid-based architectures.

Simply put, we will be even more aggressive in our push to help our customers build their new cloud, hybrid, and next-gen application solutions. In addition to delivering new vADC solutions and business models, we will now combine these application-level benefits with enhanced security offerings, catapulting our customers’ ability to provide secure application performance to new levels.

Strategy: Our team knew disruption was coming to the application delivery market. That is why at Zeus they built the world’s first virtualized software application delivery controller architected for a new way of delivering IT. Since then, that strategy was enhanced with a focus on the emergence of cloud and then further focus was placed on industry-leading flexibility and management with Services Director allowing our customers infinite deployment flexibility in-house or across a variety of cloud or hybrid deployment models.

At Pulse Secure, we can now accelerate even faster into micro-service delivery in the cloud and hybrid environments combined with complete security solutions. This strategy perfectly aligns with Pulse’s vision to deliver secure access to people, devices, things, and services. Together we will deliver answers to tomorrow’s secure access needs, starting today.

I want to thank our incredible team and our customers and partners for joining me on the next chapter in our story. We have a tremendous opportunity ahead of us now with Sudhakar and his management team helping write the tale. Keep the pages turning.



Author: Marion Smith


  • 0

Secure Access Solutions for Mobile, Cloud and Internet of Things – Latest Release

Category : Pulse Secure

Embrace the latest cloud, mobile and IoT technologies with Secure Access. Learn how Pulse Secure’s latest features and capabilities make it simple to securely roll out new end-user services to support the latest IT transformation without compromising security compliance or taxing your IT team.

Last year we delivered over 250 new product features. Learn about the latest features in:

  • Connect Secure
  • Policy Secure
  • Pulse Client

All are now available in Pulse Access Suite which makes planning, purchasing and deploying a snap. We’ve assembled our product owners to tell you what’s new, so be sure to join and drill down with the experts.

Listen NOW!


Phil Montgomery – Vice President of Marketing 
With 20+ years in enterprise solutions, Phil leads Corporate Marketing, as well as Product and Solutions Marketing, at Pulse Secure. Prior to joining Pulse Secure, he served as executive roles in product management at Identiv, Inc, VMware, and Citrix Systems. A graduate of University of Southern Queensland with a Bachelor of Business degree in operations management and end-user computing.

Prashant Batra – Director of Product Management 
Building mobile and cloud products for the past 10 years, Prashant is responsible for Pulse Secure’s Saas offerings for management, mobile, and cloud. Previously, he held product management and engineering roles at Citrix and Conexant. He has a Master’s in Embedded Systems Design.

Ganesh Nakhawa – Senior Product Manager for Pulse Policy Secure
With over 16 years of security and networking experience, Ganesh has held various product management, product marketing, and engineering roles at companies such as MOCANA, Bradford Networks, AFL, Nortel Networks, and Cabletron. Ganesh has a M.S. in Telecommunication from Boston University and M.B.A from Babson College.

Listen NOW!

  • 0

Prevent Threats of IoT from Sneaking Past Your IT Team

Category : Pulse Secure

The Evolution of IoT

Business and consumer industries have witnessed an unprecedented growth over the last couple of years. This growth, primarily driven by evolution of technologies, provides a huge opportunity for organizations of all verticals but also presents a new set of challenges. IoT (Internet Of Things) evolved due to an increasing number of Internet users, demand in interconnecting devices, and exchange of data through a means of common channel or medium.

As the number of device connections increases with the advent of IoT, there is a serious concern at every enterprise to quickly identify the source of threat and mitigate the risk of exposing an organization’s sensitive data and information. It is now becoming a critical and top priority task to implement security policies to protect confidentiality and data through strong endpoint visibility and enforcement. Check out our strategy on securing IoT in enterprise environments.

IoT can be divided into 3 categories, based on usage and client base:

  • Consumer IoT – includes connected devices such as smart cars, phones, watches, laptops, connected appliances, and entertainment systems
  • Commercial IoT – includes things like inventory controls, device trackers, and connected medical devices
  • Industrial IoT – devices like connected electric meters, waste water systems, flow gauges, pipeline monitors, manufacturing robots, and other types of connected industrial devices and systems

According to Gartner, in 2016 there were more than 5.5 million new things connected every day, totaling 6.4 billion connected things worldwide, b with an estimated 20.8 billion devices connected by 2020.

The Risk Factor

Some of the common IoT attacks include DDoS (Distributed Denial-of-Service.) This type of attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers with network traffic. Such an attack is often the result of multiple compromised systems (for example, a botnet.) A botnet is the primary method of compromise of IoT devices, used to perform DDOS attacks, steal data, send spam, and allow the attacker access to the device and its connection. DDoS is becoming more common and frequent. Read how two major U.S. Law Firms fell victim to DDoS attacks.

Pulse Policy Secure to the Rescue

Pulse Policy Secure provides endpoint profiling with techniques (Nmap scanning, DHCP Fingerprinting) to determine the endpoint connections of IoT devices on the network. Profiler uses MAC based authentication to profile endpoints on the network and categorize based on the MAC address, IP address, location and type. It also allows admins to configure role-mapping rules based on the device attributes and create regular expressions in the role mapping rules to detect spoofing attacks.

For example, if a device such as an IP camera or Printer has been profiled and categorized to the appropriate role and later the same device behaves differently, it is detected. Profiler applies the configured enforcement policies to mitigate the threat of IoT access and automatically remediates based on a restricted VLAN that admins have configured.


Are you prepared for the future of IoT? Do not wait until 2020 when an estimated 20.8 billion devices will connect worldwide. As technologies advance, it’s our responsibility at Pulse Secure to deliver Secure Access solutions for people, devices, things, and services. Pulse Secure’s Pulse Access Enterprise Suite (which includes Pulse Policy Secure) will prepare you for the future of IoT. Meet us half way to secure your networks in the landscape of IoT.

For more information please visit

Check out the Pulse Policy Secure video:





Author: Vikram Navali

  • 0

Pulse Policy Secure: NAC Product Overview and Insight

Category : Pulse Secure

Pulse Secure LLC is a provider of secure access and mobile security solutions to both enterprises and service providers. The company was formed in 2014 from Juniper Networks’ Junos Pulse business. Founded in 2004, it is privately owned and based in San Jose, Calif.

Product Description

Pulse Policy Secure version 8.3 has an on-box profiler for enterprise-grade visibility and multi-standard enforcement capabilities. It is integrated with multi-vendor firewalls, switches, wireless LAN controllers (WLCs), network infrastructure, security assessment & intelligence, endpoint security, and EMM vendors. It offers network admins the ability to apply policies for controlling device and user access to corporate networks. Typically, these policies include user authentication, endpoint configuration and device authentication. As companies increase BYOD adoption and prepare for the Internet of Things, the Pulse NAC solution supplies policy management, baseline, access control, guest networking services, proofing and visibility and bidirectional integration.


Agent and agentless options are available. Pulse Client 5.3 is the latest version, and supports Microsoft Windows, Mac, Linux, iOS and Android.

Markets and Use Cases

Key use cases are BYOD, guest access, visibility and control, and compliance.

Applicable Metrics

Up to 50,000 concurrent users, 4.2 Gbps throughput and 115 user logins per second.

Security Qualifications

Policy Secure provides FIPS level 1 (FIPS 140-1 and 140-2) support. It also allows you to enable HIPAA security rules. Policy Secure 5.3 is DoD certified for Unified Capabilities (UC) Approved Products List (APL).
Intelligence: It can be deployed automatically using NetConf. Policy Secure also consumes threat intelligence information from some sources, such as Juniper Networks’ SRX firewall, and can use that intelligence to automatically change endpoint access.


Available via appliance (physical or virtual).


Author: Drew Robb