Category Archives: Pulse Secure

  • 0

Secure Access in the Virtual Landscape

Category : Pulse Secure

Whether supporting “workstyle innovation” initiatives in Japan or supporting higher order compliance requirements for the financial sector, our mission to deliver Secure Access solutions for people, devices, things and services is improving the productivity of enterprises all over the world at an increasing rate. Central to our Secure Access mission is the core belief that “Security must be about ACCESS and NOT (just) about CONTROL”.

Our design goal priorities:

  1. Simpler and more integrated user experiences
  2. Designing for “inherently” mobile users and
  3. Supporting hybrid deployments

To date, the majority of our Secure Access deployments have been on industry standard appliances, known for high-performance, ease of maintenance and superior ROI.  I have the good fortune of meeting customers across the world to understand their needs and determine how Pulse Secure, and partner, solutions are ideally suited to deliver their success. Routinely, the following challenges and considerations emerge:

  • Access sprawl – different technologies and applications with custom access solutions leading to Security holes and administration overhead
  • Too many clients leading to management challenges – mobile, network access, remote access etc.
  • Complexity that leads to higher IT costs and a decrease in administrator productivity
  • The question of “how best to leverage cloud/hybrid deployments in a Secure manner”

Our exclusive focus on Secure Access and our more than 800 talented Pulsers have been, and are dedicated, to addressing each of the above – and emerging – customer needs. We have made rapid progress since our inception and our latest improvements are aimed at giving our customers more CHOICES by supporting virtual editions and cloud delivery options.

Our recently announced software releases present customers the opportunity to enable Secure Access for their changing data center, allowing them to:

  • Procure and deploy virtual editions of our industry leading Secure Access Solutions. We support a broad, and ever growing, range of virtual environments for the data center
  • Optionally deploy in various cloud environments. Customers and partners can procure from various cloud marketplaces, including Bring Your Own Licenses (BYOL) configurations
  • Flexibly procure virtual editions as subscriptions. This gives them the option of choosing between CapEx and OpEx deployments

We have ensured complete feature parity between our virtual, cloud and physical editions – an important consideration for deployment flexibility. Customers can mix and match physical,  virtual and cloud deployments as their Hybrid IT needs dictate and leverage common clients, licensing servers and management platforms to integrate their access solutions and enhance the productivity of their employees from any device and from any location, all while enjoying the flexible deployment and pricing options. Our Customer Success and Support offerings are all available with these new virtual and cloud editions.

Pulse Secure remains relentlessly focused on customer success. As we accelerate the Secure Access journey, supporting cloud and virtual deployment models and other emerging technologies, our core belief will always be the basis of Secure Access solutions, the belief that security must be about Access and NOT just control.


Author: Sudhakar Ramakrishna

  • 0

The Right IoT Mindset for 2018 and Beyond

Category : Pulse Secure

Just when companies thought they’ve successfully transitioned to a mobile work force, Internet of Things (IoT) devices have followed hot on the heels, tempting would be takers with unprecedented productivity and margins should they dare traverse the proverbial minefield.

As IoT stands now, there is no clear swim lane, no tested and proven path of least resistance, no clear best practice for every implementation. Too many solutions, too little standards. Most of us know the destination – a network utopia of connected devices working harmoniously. Scalable, visible, secure. Is 2018 the year we lay the concrete over the IoT foundations?

Applications Aplenty, Consolidations Coming

It’ll be hard to find an industry not headed towards an IoT future:

  • Finance: Forget the cash. Contactless payments, biometrics, wearables
  • Transportation: Look, no hands! Driverless vehicles for you and I
  • Healthcare: Your family doctor without a pulse

Price, complexity, compatibility, scalability – there’s clearly plenty to consider for traditional businesses wanting to adopt IoT. It’s currently a jungle out there, and we’re going to start seeing consolidation as victors emerge. The bigger fishes are primed and hungry for the technology and data acquisitions will bring.

History Doesn’t Have to Repeat Itself

As we race towards building infrastructure and apps (as we did with LAN years ago), as we invest heavily into transforming into Smart Nations, we absolutely need to keep security top of mind. Just think about the number of high-profile hacks, breaches, and threats we’ve read about this year. The vast majority of them could have been prevented.

The stakes are higher than before. In 2018, data is going to be collected like never before. And increasingly personal data at that. Bank accounts, medical conditions, criminal histories, you name it. Security needs to be baked-in to every design concept and not a bolt-on at a later stage.

Goodbye Corporate Device, Hello Dynamic Policies

The company issued device is dead. Users want to use their own device to get their work done. And it shouldn’t matter whether they’re at home or in the office, users need that consistent user experience. But, with the multitude of corporate apps for dozens of different uses, admins have had to play a game of policy juggling. An exception here, an allowance there, each turn into a hole you punch in your firewall and perimeter defenses.

Dynamic policies are the happy silver bullet here. Make decisions based on the user, their profile and therefore their policy. It shouldn’t matter where or how they’re connecting.

The truth is there is no hard deadline here like the millennium bug, so the journeys we all take are bound to be different. The dynamic data centre of cloud and IoT is an exciting destination, and we’ll figure out the most optimal way there eventually. But till then, if we keep secure access in mind, our colleagues, users, stakeholders will thank us.


Author: Don Tan

  • 0

Same Security, Less Complexity

Category : Pulse Secure

It can be tempting to “see no evil, hear no evil, speak no evil” when it comes to the sensitive topic of upgrading hardware appliances. After all, things appear to be running fine. Yes, the security profile is crumbling. Yes, new software releases cannot run on the aging hardware. Yes, the hardware itself may abruptly give up the ghost. But the thought of upgrades and migrations may be so distasteful due to the anticipated complexity that the mounting risk is glossed over.

But, what if upgrading to new hardware appliances …

… is so simple that all you need to do is export configurations off your old platforms and import them to the new platforms?

… is so seamless that you won’t have to make any tedious administrative changes to employee desktops and devices?

… is so swift that migrating the software takes less time than physically racking the hardware?

Simple, seamless, swift. That’s what upgrading to Pulse Secure Appliances is about. And with the upgrade in the bag, your business can move forward with confidence, knowing that you have Secure Access for all your people, devices, things, and services. Not only will you enjoy better performance with the new hardware, but the realized productivity gains and increased scalability will optimize your speed to market as you expand your services.

Then there’s the security: with new Pulse Secure Appliances, you will have the same robust security for your services that you have always enjoyed – and, in many cases, the security will be even better! As Pulse continues to develop and deliver new capabilities, security is always enhanced along the way. These constantly improving security services are a function of the new hardware architecture. To take advantage of new capabilities and the security that wraps around them, an appliance upgrade is essential.

So, don’t be concerned about complexity: it’s simply not there when upgrading your Pulse Secure Appliances. Don’t worry about security: it will be better than ever after you make the move. And, finally, don’t worry about cost: through the end of 2017, you can buy one appliance and get another one free – the best “BOGO” offer you will ever see. Plus, you’ll lower the risk of expensive cyber breaches through improved security, and reap the benefits of increased productivity and scalability. Secure your future now – it’s simple, seamless, and swift, and brings increased security and services that will propel your business into the new year!

Wistia video thumbnail - Secure the Future Promotion
Author: Greg Basset

  • 0

How to Deliver Always-On Applications for the Always-On Business

Category : Pulse Secure

Never before has the choice of business application impacted an organization’s competitive edge as much as it does today. In fact, enterprises are spending up to a third of their IT budgets on Enterprise Resource Planning (ERP) applications alone—along with more spending for other business applications to streamline processes and increase efficiencies. Add Unified Communication and Collaboration tools to the mix, for productivity gains, and you’ll understand just how valuable these business applications are.

If these applications perform well, the business will do well. The trouble is, they typically don’t perform well: 88 percent of companies* report poor application performance as a real business issue.

So, How Do You Get More from Your Investment?

The traditional route to improving application performance has gone from load-balancing to proxy servers to traffic manipulation and ultimately Application Delivery Controllers (ADCs).

And ADCs have served us well—optimizing transaction routing for the most reliable response.

In fact, they were so good that we became dependent on them. We needed more and more of them. And suddenly there was ADC sprawl as a whole network of ADCs was put in place, just in case they were needed at some point. But the solution was quickly becoming a problem, as these great islands of ADCs were oversized, expensive, and complex to maintain.

We needed a new way to deliver business applications reliably, without over-provisioning.

So the ADC has gone virtual.

Closing the Application Performance Gap

With virtual ADCs (vADCs), you have the always-on availability that always-on businesses need. The Pulse Secure Virtual Traffic Manager (vTM), a key component of Pulse Secure vADC solutions, provides a virtually instant response to meet demand any time, every time. Because they’re highly scalable, vADCs give you a common solution that’s easily portable between environments—delivering faster, more reliable applications, on premise and in the cloud.

Whatever the network traffic, virtual application delivery solutions can automatically manage spikes, redistribute loads, and prioritize transactions and service levels. vADCs can also include an application-aware firewall for security and are highly customizable to enforce business rules, and control users and services.

The result?

Your applications are no longer isolated islands that only work well within their own environment and don’t stretch further. vADCs bring your applications together—enabling faster collaboration and smoother workflows—improving performance, the end-user experience, and ultimately your revenue.


Author: Paul Wallace

  • 0

Pulse Secure Recognized as Ingram Micro Emerging Vendor of the Year

Category : Pulse Secure

Pulse Secure is proud to announce it has received the Emerging Vendor Award from Ingram Micro Inc., the world’s largest wholesale technology distributor. Presented during Ingram Micro Experience 2018, the win celebrates the increasing demand and brand awareness within the IT channel for Pulse Secure as an Emerging Vendor.

The annual event, hosted by Agency Ingram Micro was held on October 27 in Anaheim, Calif.  Nearly 30 vendors earned the title of “Vendor of the Year” across more than two dozen high profile technology categories including cloud, consumer technology, advanced solutions and consumer and global markets. The winning partners were evaluated across a variety of criteria and key performance indicators, including collaboration, marketing and sales.

“The channel is home to tens of thousands of incredible and innovative organizations that realize the business value in going-to-market with Ingram Micro,” said Jennifer Anaya, vice president, marketing, Ingram Micro. “We are honored to present the Emerging Vendor Award to Pulse Secure for going above and beyond with Ingram Micro to better serve the needs of our channel partners and help their end-customers achieve their business goals faster and with greater engagement and accountability.”

“Pulse Secure recognizes the value of its relationship with Ingram Micro and appreciates this Emerging Vendor Award which highlights our excellence within the field of Secure Access for the next generation,” said Aaron Moroson, Sr. Director, WW Distribution for Pulse Secure. “Having strong go-to-market relationships is essential in the delivery of high value solutions that allow our channel partners to secure critical infrastructure and deliver long term success to their end customers.”


  • 0

When It Comes to Access, Security, and Visibility, Is Your Head in the Clouds?

Category : Pulse Secure

Today’s massive migration to the cloud is no surprise. Traditional data center models are more expensive, less flexible, and less scalable than the cloud – all challenges you can’t afford if you want to remain competitive. But as data, applications, and workflows move to the cloud, there are obstacles to overcome before the unquestionable benefits of the cloud can be reaped. Three of the biggest obstacles are access, security, and visibility.


From an enterprise perspective, you need applications and data to be available no matter where they reside (on-premise, in the cloud, or in multiple clouds) and no matter how they are accessed (computer, laptop, or mobile device). To complicate matters, this accessibility needs to happen in the most efficient manner possible. For example, data may go from a consumer’s mobile phone to a corporate website to a back-end application where it is processed and the output is sent to a third-party vendor for further action. You will need to perform load balancing at each stage to provide high-availability access and productivity around the world.


Ensuring instant access raises the issue of security. A common mistake that companies make is assuming that the same set of environmental protections they had on premise is automatically present in the cloud. However, in the cloud, you are storing data on instances that you don’t necessarily own. You may be sharing instances with other entities. Consequently, you need to take steps to encrypt data, whether it is in motion or at rest, and whether it is being produced or acted upon by consumers, contractors, partners, or employees.


When considering access and security, a key question to ask is, “Who is allowed access to what types of data?” Visibility and analytics reporting of data, applications, and users is critical to understand user roles and user behavior in such a way that the information will aid IT administrators in determining how and by whom data should be acted upon or consumed.

Pulse Secure’s best in class end-to-end Secure Access solution addresses these needs. The solution

  • Delivers secure access for enterprise applications and consumer-facing web applications
  • Protects data and applications on-premise or in the cloud
  • Provides local and global load balancing to ensure access in a secure and fast manner
  • Incorporates role-based access control
  • Enables single sign-on capability to ensure a frictionless user experience
  • Simplifies administration through centrally-managed access policies

Best of all, Pulse Secure’s latest vADC solution can be implemented wherever you are on your cloud journey: whether you are completely in the cloud, using a hybrid solution, or in the process of migrating key applications and data.

Cloud is here to stay. And with Pulse Secure’s Secure Access solutions supporting your applications and data, you can stay firmly grounded with comprehensive access, security, and visibility.

Check out: 4 Ways vADC Can Transform Your Business



  • 0

Spooky Cyber Security Stories

Category : Pulse Secure

With Halloween just around the corner, there are lots of scary network security stories you might hear or even worse have experienced first hand. Don’t let these stories spook you, but be prepared, they can be unbearable.

The Night that Krack Attacked: A Flawed WPA2

One cold and cloudy October night, an employee comes back to their office to complete a project with a tight deadline. The lights don’t seem to turn on and it’s awfully quiet, with only the sounds of hard drives humming at each workstation. The employee connects to the corporate Wi-Fi network via their computer and so begins the WPA2 security protocol and the process of the four-way handshake, the protocol used in most modern WiFi systems. As this process begins, to ensure the user and access point have the correct credentials to be granted network access, the newly discovered flaw, KRACK, is used by an attacker to intercept this handshake process, force install the same encryption key, and then follow through with an attack and decryption of data. This late October night just grew darker with credit card and password information now exposed and a nightmare for IT the following morning. This was the night that KRACK attacked…

Don’t get spooked, here are 3 ways you can enhance your Wi-Fi security against threats like KRACK:

Magniber, It’s Alive and Only Wants A Few

A monster with unusual tendencies, that of targeting only very specific users in a particular region and ignoring the rest, waiting for its chance to pounce. Now taking over the distribution method of Cerber ransomware, Magniber is a new monster that performs language and geolocation checks to specifically target South Korea. The attack is executed through malvertising and exploiting a memory corruption vulnerability in Internet Explorer. Are you safe in your geolocation?

Magniber source:


Author: Stephanie Briggs

  • 0

KRACK & WPA Vulnerability, 3 Ways to Enhance Wi-fi Security

Category : Pulse Secure

Security researchers recently announced vulnerabilities in WPA2 encryption, practically used everywhere since WEP went the way of the dodo. The implications of the discovery are clear:

  • The attack works against all modern protected Wi-Fi networks
  • If your device supports Wi-Fi, it is most likely affected

This means threat actors are able to see your traffic, hijack connections, and perform man-in-the-middle attacks. So, is WPA2 also going the way of the dodo? Not exactly. Manufacturers are rolling out fixes – they were notified as early as August.

But it’s time for us to see wireless as a shared medium. Where a cable allows for a direct, physical connection, the nature of wireless is that it’s accessible to everyone. On a shared medium, you want to know who exactly is on it, and give them the appropriate level of access. No baddies spying on you or impersonating your users.

Here are 3 ways to enhance your Wi-fi security:

Tunnels shield you from the elements

Instead of relying only on traditional WPA2, opt for best in class security – custom ciphers with a dedicated SSL VPN connection. Attackers see only an encrypted tunnel of traffic, no eavesdropping allowed

Are you who you say you are?

Look for a BYOD-ready network access control solution with automated, self-service onboarding of devices that give only authorised devices access, and intelligently restricts the unauthorised

Please come back when you’re healthy

Host checking comes in handy to ensure end points are in compliance before they enter your network. Virus definitions? Latest patches? Peace of mind? Check.



  • 0

Buy one appliance and get the second one free

Category : Pulse Secure

Modernize your enterprise VPN with the latest Pulse Secure appliances, software and services at a reduced cost and empower your workers with the trusted secure access that 20,000 customers know and love. Secure the future today to deliver and scale new IT services tomorrow.

A free PSA5000 or PSA7000 when you buy the same appliance with the Pulse Access Suite.

Buy the Advanced or Enterprise Suite Editions and you can extend this buy-one-get-one-free offer to platform options such as license server software (with member licenses) or ICE (in case of emergency) licenses.

*This offer is only available for the PSA5000 and PSA7000 with a minimum purchase of Pulse Access Suite licenses per hardware pair. Find the complete terms and conditions here.

If interested  CONTACT US!

  • 0

6 Dangerous Misconceptions about Network Security

Category : Pulse Secure

When assessing or implementing network security, misconceptions can be dangerous, leading your company’s data to be at risk and, with it, your reputation, your revenue, and possibly your business. With that in mind, be on guard against these six insidious misconceptions:

1. Threats only come from the outside. This is a common misconception, but the truth is that most infiltration issues and security breaches happen from inside the network. While this could be due to a malicious employee, most often it is simply the result of ignorance. For example, an employee may bring his own device and use it for work – but it is unsecured. Another person may have a hub sitting underneath her desk to which she connects multiple machines – some of which are personal. You must have a diligent secure access strategy in place that includes internal security compliance to prevent such security risks.

2. Our employees would never fall for a phishing scam.Yes, they would. And they do. Phishing is very sophisticated nowadays, with spear phishing campaigns that are personalized and tailored to a specific individual. Even a savvy employee can fall prey to an email that looks and sounds authentic.

3. Network access control (NAC) is too difficult to use.Five years ago, that may have been the case. NAC was hard to understand, tough to implement, and irritating for the end user. With business trends evolving to support initiatives like BYOD and IoT, however, network access control has also adapted to meet such demands. For example, Pulse Secure’s NAC solution, Policy Secure, is streamlined, simplified, and user-friendly. You can easily profile your network and get a clear picture of exactly what is residing on it and connecting to it, both internally and externally. Plus, you can gain full visibility into which people and devices have access to what data.

4. Our firewall checks everything. It may – but the danger of using VPN components that are offered by next-generation firewalls is that they don’t always perform enough checks. Contrast that with a Pulse security solution that validates software patches, apps, and other elements through host-checking capabilities prior to allowing them on the network as well as during connections, and you’ve got yourself a fast and reliable secure access solution that will protect your company’s data yesterday, today, and tomorrow.

5. The cloud is secure. We want to believe this, but it’s not that simple. The cloud is where everything is going; in essence, we are moving to huge server farms hosted by large organizations such as Google or AWS, and their primary product offering is space, processing power, and bandwidth – not security. That is their niche and their expertise. To protect that space, you must look to the secure access experts for the best security platform solutions that can be deployed across hybrid IT environments.

6. Our security is good enough. This is the biggest and most dangerous misconception of all: companies assume that if their security was good enough last year or three years ago, it is good enough today … even if it hasn’t been updated in recent history. So, before you say, “Our security is good enough,” ask yourself: are you willing to bet your business on that? Ransomware can get through VPNs or open ports outside the network, potentially encrypting your entire network. Don’t jump onto this bandwagon too fast: your network security could be on the line.

Maybe yesterday’s network security isn’t good enough. If you’re serious about security, it’s time to do some serious security upgrades.

Learn more about the importance of upgrading hardware here.


Author: Jeremy Allen