Category Archives: Pulse Secure

  • 0

To Upgrade or Not to Upgrade Your Hardware, that Is the Question

Category : Pulse Secure

When you think of security, you probably think “software” first. But software runs on hardware, and if your network security and access appliances are aging, your security profile may be crumbling – without you being aware of it.

Your network security and access appliances sit at the edge of your network, determining who can be let into the network and how much access they should be given. Since security threats are evolving by the day, these appliances need up-to-date software to appropriately protect your company and users from harm. But have you considered the vulnerabilities of outdated hardware appliances? If your appliances are three or four generations old, the latest software versions are likely not compatible with your hardware, so you’re left running out-of-date software.

This leaves you with two choices:

  • Upgrade your hardware so that you can get the latest software to maintain robust protection, or,
  • Keep your current hardware and entrust the security of your network to out-of-date software.

Frequently, companies choose the latter option. After all, their hardware appears to be working, so why upgrade it? An admin may think, “As long as my end users aren’t calling me to complain, everything must be working fine.” Unfortunately, “working” does not equal “secure.” For example, suppose you use OpenSSL for your backend services. Over the past few years, OpenSSL has identified several vulnerabilities. Hackers know this, so they look for devices running older versions of OpenSSL to exploit. At Pulse Secure, we monitor for such events and quickly provide patches in our software updates. But if your appliance can’t run the latest security software and you’re using an older version of OpenSSL, you are wide open to an attack.

That is just one example among the hundreds and thousands of enhancements and updates constantly being created to address new risks, threats, and vulnerabilities.

Aging hardware is also a risk because it will ultimately fail at some point. That is a generally-accepted principle when deploying hardware: there is a mean time between failures. It is why equipment is only guaranteed for a certain number of years. After that, the likelihood of failure becomes statistically high.

Aging hardware therefore presents a double risk: you may suffer a breach because of out-of-date security software, and you might completely lose functionality because of equipment failure. Both eventualities will leave you scrambling to repair the damage. The good news is, you can prevent a catastrophic situation by being proactive in upgrading your network security and access appliances.

Upgrading hardware not only prevents security breaches, but it also brings quantifiable value to daily business operations. For example, at Pulse Secure, our security software updates include new features to make deployment easier through wizards – so what took 30 steps before may take just five now. By minimizing the clicks, we streamline administrative tasks, saving you both time and money.

Plus, with every new generation of hardware comes leading-edge components: memory, processors, hard disks, network interface cards, etc. New hardware can handle more users and manage traffic faster and more reliably than ever so you can do more with less.

Take a hard line when it comes to upgrading your hardware. You will gain increased security to meet today’s sophisticated threats, reduce your network complexity, improve productivity, enhance the user experience, and lower your bottom line costs. The only thing you lose is the experience of getting hacked … and we can all do without that.

Source: https://blog.pulsesecure.net/upgrade-not-upgrade-hardware-question/

Author: Stephanie Briggs


  • 0

A new vADC chapter is written

Category : Pulse Secure

A new chapter for a visionary disruptor:

Today, the vADC team gets to write a new chapter in the life of a product line they love, it’s the next big step in the exciting journey of building the best vADC on the market. We’re now settling in to our new home at Pulse Secure, and we couldn’t be happier.

Pulse Secure is a market-leading secure access company moving aggressively with a single mission to deliver “Secure Access Solutions for People, Devices, Things and Services”. Adding the vADC capabilities to the portfolio not only further strengths the ability to deliver the most complete secure access platform but is also meets the perfect intersection of security, cloud, and vADC.

I am personally enthusiastic about turning this page and about transitioning across as General Manager of the vADC business at Pulse Secure.

I’m excited for three main reasons. People, Product and Strategy.

People: I have had the great pleasure of working with great people, from management to brilliant individual contributors on the vADC team at Brocade. We have incredible engineers, product management, marketing and sales people. Making this move, I get to continue working with that global team, and I am fortunate enough to now include the Pulse team to that list of teammates.

Under Sudhakar Ramakrishna’s leadership, Pulse Secure has thrived and seen repeated, continuous growth by simply executing well. The people at Pulse have successfully grown the business to include over 20,000 customers, develop a customer service organization that is best in class, delivering Net Promoter Scores (NPS) surpassing the world class 40 mark, representing the top 25% of all software companies. – Pulse has grown revenue and profitability consistently, all while fostering a collaborative, can-do culture.

Product: Our vADC product has long been viewed as visionary, not just in a magic quadrant kind of way, but truly in the customer’s eyes. That is why we have won customers such as China Mobile and Pernod Ricard. Looking back is not enough though, finding a home where we can thrive at innovating means our product will not only remain a leader in today’s migration from Mode 1 to Mode 2, but also that it will be the platform for tomorrow’s micro-services hybrid-based architectures.

Simply put, we will be even more aggressive in our push to help our customers build their new cloud, hybrid, and next-gen application solutions. In addition to delivering new vADC solutions and business models, we will now combine these application-level benefits with enhanced security offerings, catapulting our customers’ ability to provide secure application performance to new levels.

Strategy: Our team knew disruption was coming to the application delivery market. That is why at Zeus they built the world’s first virtualized software application delivery controller architected for a new way of delivering IT. Since then, that strategy was enhanced with a focus on the emergence of cloud and then further focus was placed on industry-leading flexibility and management with Services Director allowing our customers infinite deployment flexibility in-house or across a variety of cloud or hybrid deployment models.

At Pulse Secure, we can now accelerate even faster into micro-service delivery in the cloud and hybrid environments combined with complete security solutions. This strategy perfectly aligns with Pulse’s vision to deliver secure access to people, devices, things, and services. Together we will deliver answers to tomorrow’s secure access needs, starting today.

I want to thank our incredible team and our customers and partners for joining me on the next chapter in our story. We have a tremendous opportunity ahead of us now with Sudhakar and his management team helping write the tale. Keep the pages turning.

Marion

Source: https://blog.pulsesecure.net/new-vadc-chapter/

Author: Marion Smith

 


  • 0

Secure Access Solutions for Mobile, Cloud and Internet of Things – Latest Release

Category : Pulse Secure

Embrace the latest cloud, mobile and IoT technologies with Secure Access. Learn how Pulse Secure’s latest features and capabilities make it simple to securely roll out new end-user services to support the latest IT transformation without compromising security compliance or taxing your IT team.

Last year we delivered over 250 new product features. Learn about the latest features in:

  • Connect Secure
  • Policy Secure
  • Pulse Client

All are now available in Pulse Access Suite which makes planning, purchasing and deploying a snap. We’ve assembled our product owners to tell you what’s new, so be sure to join and drill down with the experts.

Listen NOW!

Presenters:

Phil Montgomery – Vice President of Marketing 
With 20+ years in enterprise solutions, Phil leads Corporate Marketing, as well as Product and Solutions Marketing, at Pulse Secure. Prior to joining Pulse Secure, he served as executive roles in product management at Identiv, Inc, VMware, and Citrix Systems. A graduate of University of Southern Queensland with a Bachelor of Business degree in operations management and end-user computing.

Prashant Batra – Director of Product Management 
Building mobile and cloud products for the past 10 years, Prashant is responsible for Pulse Secure’s Saas offerings for management, mobile, and cloud. Previously, he held product management and engineering roles at Citrix and Conexant. He has a Master’s in Embedded Systems Design.

Ganesh Nakhawa – Senior Product Manager for Pulse Policy Secure
With over 16 years of security and networking experience, Ganesh has held various product management, product marketing, and engineering roles at companies such as MOCANA, Bradford Networks, AFL, Nortel Networks, and Cabletron. Ganesh has a M.S. in Telecommunication from Boston University and M.B.A from Babson College.

Listen NOW!


  • 0

Prevent Threats of IoT from Sneaking Past Your IT Team

Category : Pulse Secure

The Evolution of IoT

Business and consumer industries have witnessed an unprecedented growth over the last couple of years. This growth, primarily driven by evolution of technologies, provides a huge opportunity for organizations of all verticals but also presents a new set of challenges. IoT (Internet Of Things) evolved due to an increasing number of Internet users, demand in interconnecting devices, and exchange of data through a means of common channel or medium.

As the number of device connections increases with the advent of IoT, there is a serious concern at every enterprise to quickly identify the source of threat and mitigate the risk of exposing an organization’s sensitive data and information. It is now becoming a critical and top priority task to implement security policies to protect confidentiality and data through strong endpoint visibility and enforcement. Check out our strategy on securing IoT in enterprise environments.

IoT can be divided into 3 categories, based on usage and client base:

  • Consumer IoT – includes connected devices such as smart cars, phones, watches, laptops, connected appliances, and entertainment systems
  • Commercial IoT – includes things like inventory controls, device trackers, and connected medical devices
  • Industrial IoT – devices like connected electric meters, waste water systems, flow gauges, pipeline monitors, manufacturing robots, and other types of connected industrial devices and systems

According to Gartner, in 2016 there were more than 5.5 million new things connected every day, totaling 6.4 billion connected things worldwide, b with an estimated 20.8 billion devices connected by 2020.

The Risk Factor

Some of the common IoT attacks include DDoS (Distributed Denial-of-Service.) This type of attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers with network traffic. Such an attack is often the result of multiple compromised systems (for example, a botnet.) A botnet is the primary method of compromise of IoT devices, used to perform DDOS attacks, steal data, send spam, and allow the attacker access to the device and its connection. DDoS is becoming more common and frequent. Read how two major U.S. Law Firms fell victim to DDoS attacks.

Pulse Policy Secure to the Rescue

Pulse Policy Secure provides endpoint profiling with techniques (Nmap scanning, DHCP Fingerprinting) to determine the endpoint connections of IoT devices on the network. Profiler uses MAC based authentication to profile endpoints on the network and categorize based on the MAC address, IP address, location and type. It also allows admins to configure role-mapping rules based on the device attributes and create regular expressions in the role mapping rules to detect spoofing attacks.

For example, if a device such as an IP camera or Printer has been profiled and categorized to the appropriate role and later the same device behaves differently, it is detected. Profiler applies the configured enforcement policies to mitigate the threat of IoT access and automatically remediates based on a restricted VLAN that admins have configured.

 

Are you prepared for the future of IoT? Do not wait until 2020 when an estimated 20.8 billion devices will connect worldwide. As technologies advance, it’s our responsibility at Pulse Secure to deliver Secure Access solutions for people, devices, things, and services. Pulse Secure’s Pulse Access Enterprise Suite (which includes Pulse Policy Secure) will prepare you for the future of IoT. Meet us half way to secure your networks in the landscape of IoT.

For more information please visit www.pulsesecure.net.

Check out the Pulse Policy Secure video:

 

References: 

http://iot.ieee.org/newsletter/march-2017/three-major-challenges-facing-iot

http://www.gartner.com/newsroom/id/3165317

 

Source: https://blog.pulsesecure.net/pulse-policy-secure-mitigates-threats-iot/

Author: Vikram Navali


  • 0

Pulse Policy Secure: NAC Product Overview and Insight

Category : Pulse Secure

Pulse Secure LLC is a provider of secure access and mobile security solutions to both enterprises and service providers. The company was formed in 2014 from Juniper Networks’ Junos Pulse business. Founded in 2004, it is privately owned and based in San Jose, Calif.

Product Description

Pulse Policy Secure version 8.3 has an on-box profiler for enterprise-grade visibility and multi-standard enforcement capabilities. It is integrated with multi-vendor firewalls, switches, wireless LAN controllers (WLCs), network infrastructure, security assessment & intelligence, endpoint security, and EMM vendors. It offers network admins the ability to apply policies for controlling device and user access to corporate networks. Typically, these policies include user authentication, endpoint configuration and device authentication. As companies increase BYOD adoption and prepare for the Internet of Things, the Pulse NAC solution supplies policy management, baseline, access control, guest networking services, proofing and visibility and bidirectional integration.

Agents

Agent and agentless options are available. Pulse Client 5.3 is the latest version, and supports Microsoft Windows, Mac, Linux, iOS and Android.

Markets and Use Cases

Key use cases are BYOD, guest access, visibility and control, and compliance.

Applicable Metrics

Up to 50,000 concurrent users, 4.2 Gbps throughput and 115 user logins per second.

Security Qualifications

Policy Secure provides FIPS level 1 (FIPS 140-1 and 140-2) support. It also allows you to enable HIPAA security rules. Policy Secure 5.3 is DoD certified for Unified Capabilities (UC) Approved Products List (APL).
Intelligence: It can be deployed automatically using NetConf. Policy Secure also consumes threat intelligence information from some sources, such as Juniper Networks’ SRX firewall, and can use that intelligence to automatically change endpoint access.

Delivery

Available via appliance (physical or virtual).

Source: http://www.esecurityplanet.com/products/pulse-policy-secure.html

Author: Drew Robb


  • 0

Put a stop to enterprise ransomware

Category : Pulse Secure

While most enterprises are still recovering from WannaCry, the world has now been hit yet again with a large-scale ransomware attack. On June 27, many businesses and end-users woke up to Petya taking control of their devices.

With the Digital Age comes a new weapon, cyberattacks!

Critical Questions Every Enterprise Should Ask

  1. How should enterprises prepare against cyberattacks?
  2. What can we learn from previous cyberattacks to implement a strategy to better protect ourselves, our interests, and take control of our fate?
  3. How does ransomware take hold of enterprises so quickly and easily?
  4. How can businesses protect data if users won’t upgrade their machines?

Petya is an example that we can learn from and prevent by first understanding its anatomy. How does this attack work? It might sound like a broken record but these types of attacks exploit vulnerabilities in software systems, in this case within an older release of Windows known as “EternalBlue.” You might be asking yourself: If this is a known vulnerability, why hasn’t it been addressed by Microsoft? Guess what – it has been and for quite some time.

It turns out, that making security patches / updates available does not necessarily translate into those patches getting installed on machines.

If You Avoid Change, You Invite Cyberattacks
Specifically in the enterprise world, where every change is best avoided, patches are slow with their uptake and not always implemented. Even when businesses decide to deploy a security patch, it does not translate into users actually accepting and installing those patches. In the case of Petya, it’s not just about patching alone. It’s about a strategic combination of security practices and solutions that seamlessly deliver accessibility of resources. This continues to remain a challenge within the growing landscape of other technologies like BYOD and IoT, adding more to the layer of challenges IT  teams are presented with each year.

Meet the Secure Access Suite, from Pulse Secure.

Pulse Secure solutions are built with the notion of ‘WHO’ gets access, from ‘WHAT’ device, to ‘WHICH’ resources. In our world, we don’t rely on the ‘authenticated’ user but we go a step further and define our authentication as a mix of User Identity + Device Compliance. A valid user coming from a ‘Compliant’ device gets access to resources. A valid user coming from a ‘Non-Compliant’ device can get limited or no access while a valid user coming from a ‘Partially compliant’ device gets access to limited resources.

Pulse Secure solutions are built with a component called ‘Host Checker’. Host Checker is the ability to scan a connecting end point, assess its security posture, and uses that to define the level of access to enterprise resources.

So how could this have protected you against Petya? Admins can setup a policy requiring minimum security patch versions to be installed on connecting devices. If not found, there is limited to no access. This would encourage users to apply the needed patches to their machine, without which they wouldn’t get access to anything.

Ransomware is here to stay, evolve, and attack again. Let’s stand up to ransomware together and strategize on the right solution for your enterprise.

Are you ready to stand up to ransomware? https://www.pulsesecure.net/products/


  • 0

Don’t Let Hackers Hold Your Enterprise Ransom

Category : Pulse Secure

While most enterprises are still recovering from WannaCry, the world has now been hit yet again with a large-scale ransomware attack. On June 27, many businesses and end-users woke up to Petya taking control of their devices.

With the Digital Age comes a new weapon, cyberattacks!

Critical Questions Every Enterprise Should Ask

  1. How should enterprises prepare against cyberattacks?
  2. What can we learn from previous cyberattacks to implement a strategy to better protect ourselves, our interests, and take control of our fate?
  3. How does ransomware take hold of enterprises so quickly and easily?
  4. How can businesses protect data if users won’t upgrade their machines?

Petya is an example that we can learn from and prevent by first understanding its anatomy. How does this attack work? It might sound like a broken record but these types of attacks exploit vulnerabilities in software systems, in this case within an older release of Windows known as “EternalBlue.” You might be asking yourself: If this is a known vulnerability, why hasn’t it been addressed by Microsoft? Guess what – it has been and for quite some time.

It turns out, that making security patches / updates available does not necessarily translate into those patches getting installed on machines.

If You Avoid Change, You Invite Cyberattacks
Specifically in the enterprise world, where every change is best avoided, patches are slow with their uptake and not always implemented. Even when businesses decide to deploy a security patch, it does not translate into users actually accepting and installing those patches. In the case of Petya, it’s not just about patching alone. It’s about a strategic combination of security practices and solutions that seamlessly deliver accessibility of resources. This continues to remain a challenge within the growing landscape of other technologies like BYOD and IoT, adding more to the layer of challenges IT  teams are presented with each year.

Meet the Secure Access Suite, from Pulse Secure.

Pulse Secure solutions are built with the notion of ‘WHO’ gets access, from ‘WHAT’ device, to ‘WHICH’ resources. In our world, we don’t rely on the ‘authenticated’ user but we go a step further and define our authentication as a mix of User Identity + Device Compliance. A valid user coming from a ‘Compliant’ device gets access to resources. A valid user coming from a ‘Non-Compliant’ device can get limited or no access while a valid user coming from a ‘Partially compliant’ device gets access to limited resources.

Pulse Secure solutions are built with a component called ‘Host Checker’. Host Checker is the ability to scan a connecting end point, assess its security posture, and uses that to define the level of access to enterprise resources.

So how could this have protected you against Petya? Admins can setup a policy requiring minimum security patch versions to be installed on connecting devices. If not found, there is limited to no access. This would encourage users to apply the needed patches to their machine, without which they wouldn’t get access to anything.

Ransomware is here to stay, evolve, and attack again. Let’s stand up to ransomware together and strategize on the right solution for your enterprise.

Source: https://blog.pulsesecure.net/dont-let-hackers-hold-your-enterprise-ransom/

Author: Prashant Batra


  • 0

Free appliance upgrades with the Pulse Access Suite

Category : Pulse Secure

The Pulse Secure Advance Now promotion combines the high performance of the Pulse Secure Appliance with new software intelligence of the Pulse Access Suite. Use it to securely connect mobile users to the cloud and your corporate network.
A free PSA300, PSA3000, PSA5000 or PSA7000 when you replace an SA, IC or a MAG appliance under support and purchase a minimum number of Pulse Access Suite licenses.
Up to a 40% discount of the suggested list price for the purchase of Pulse Access Suite Advanced or Enterprise editions.
*This promotion is for SA, IC and MAG customers with a valid support subscription.
Find the complete terms and conditions here.
Why upgrade?
  • Cloud services flexibility
  •  Easy BYOD
  •  Automatic compliance
  •  Simple integration
  •  No passwords
  •  Unified policy and visibility

UPGRADE NOW!


  • 0

Setting and Enforcing Policies with Pulse Secure Access Suites

Category : Pulse Secure

A demonstration of how to control which users are able to access which network and cloud resources. Policy variables include who is connecting, where they are, what device they are using, and the security posture of the device.
We will also take a quick look at the new virtual license server, explaining which license it can hold and which devices it can lease licenses to.
Recorded Jun 20 2017 61 mins

  • 0

Secure Access Solutions for Mobile, Cloud, and Internet of Things

Category : Pulse Secure

[WEBINAR] Tuesday, April 11, 2017 | 8:00-9:00am PST / 11:00-12:00pm EST

Embrace the latest cloud, mobile and IoT technologies with Secure Access. Learn how Pulse Secure’s latest features and capabilities make it simple to securely roll out new end-user services to support the latest IT transformation without compromising security compliance or taxing your IT team.

Last year we delivered over 250 new product features. Learn about the latest features in:

  • Connect Secure 8.3r1
  • Policy Secure 5.4r1
  • Pulse Client 5.3r1

All are now available in Pulse Access Suite which makes planning, purchasing and deploying a snap. We’ve assembled our product owners to tell you what’s new, so be sure to join and drill down with the experts.

Source: https://www.pulsesecure.net/news-events/customer-webinars/latest-release-secure-access


Support