Category Archives: Pulse Secure

  • 0

Pulse Secure Recognized as Ingram Micro Emerging Vendor of the Year

Category : Pulse Secure

Pulse Secure is proud to announce it has received the Emerging Vendor Award from Ingram Micro Inc., the world’s largest wholesale technology distributor. Presented during Ingram Micro Experience 2018, the win celebrates the increasing demand and brand awareness within the IT channel for Pulse Secure as an Emerging Vendor.

The annual event, hosted by Agency Ingram Micro was held on October 27 in Anaheim, Calif.  Nearly 30 vendors earned the title of “Vendor of the Year” across more than two dozen high profile technology categories including cloud, consumer technology, advanced solutions and consumer and global markets. The winning partners were evaluated across a variety of criteria and key performance indicators, including collaboration, marketing and sales.

“The channel is home to tens of thousands of incredible and innovative organizations that realize the business value in going-to-market with Ingram Micro,” said Jennifer Anaya, vice president, marketing, Ingram Micro. “We are honored to present the Emerging Vendor Award to Pulse Secure for going above and beyond with Ingram Micro to better serve the needs of our channel partners and help their end-customers achieve their business goals faster and with greater engagement and accountability.”

“Pulse Secure recognizes the value of its relationship with Ingram Micro and appreciates this Emerging Vendor Award which highlights our excellence within the field of Secure Access for the next generation,” said Aaron Moroson, Sr. Director, WW Distribution for Pulse Secure. “Having strong go-to-market relationships is essential in the delivery of high value solutions that allow our channel partners to secure critical infrastructure and deliver long term success to their end customers.”

Source: https://www.pulsesecure.net/news-events/press-releases/pulse-secure-recognized-as-ingram-micro-emerging-vendor-of-the-year-gnw_1937385_001


  • 0

When It Comes to Access, Security, and Visibility, Is Your Head in the Clouds?

Category : Pulse Secure

Today’s massive migration to the cloud is no surprise. Traditional data center models are more expensive, less flexible, and less scalable than the cloud – all challenges you can’t afford if you want to remain competitive. But as data, applications, and workflows move to the cloud, there are obstacles to overcome before the unquestionable benefits of the cloud can be reaped. Three of the biggest obstacles are access, security, and visibility.

Access

From an enterprise perspective, you need applications and data to be available no matter where they reside (on-premise, in the cloud, or in multiple clouds) and no matter how they are accessed (computer, laptop, or mobile device). To complicate matters, this accessibility needs to happen in the most efficient manner possible. For example, data may go from a consumer’s mobile phone to a corporate website to a back-end application where it is processed and the output is sent to a third-party vendor for further action. You will need to perform load balancing at each stage to provide high-availability access and productivity around the world.

Security

Ensuring instant access raises the issue of security. A common mistake that companies make is assuming that the same set of environmental protections they had on premise is automatically present in the cloud. However, in the cloud, you are storing data on instances that you don’t necessarily own. You may be sharing instances with other entities. Consequently, you need to take steps to encrypt data, whether it is in motion or at rest, and whether it is being produced or acted upon by consumers, contractors, partners, or employees.

Visibility

When considering access and security, a key question to ask is, “Who is allowed access to what types of data?” Visibility and analytics reporting of data, applications, and users is critical to understand user roles and user behavior in such a way that the information will aid IT administrators in determining how and by whom data should be acted upon or consumed.

Pulse Secure’s best in class end-to-end Secure Access solution addresses these needs. The solution

  • Delivers secure access for enterprise applications and consumer-facing web applications
  • Protects data and applications on-premise or in the cloud
  • Provides local and global load balancing to ensure access in a secure and fast manner
  • Incorporates role-based access control
  • Enables single sign-on capability to ensure a frictionless user experience
  • Simplifies administration through centrally-managed access policies

Best of all, Pulse Secure’s latest vADC solution can be implemented wherever you are on your cloud journey: whether you are completely in the cloud, using a hybrid solution, or in the process of migrating key applications and data.

Cloud is here to stay. And with Pulse Secure’s Secure Access solutions supporting your applications and data, you can stay firmly grounded with comprehensive access, security, and visibility.

Check out: 4 Ways vADC Can Transform Your Business

Source: https://blog.pulsesecure.net/comes-access-security-visibility-head-clouds/

Author: 


  • 0

Spooky Cyber Security Stories

Category : Pulse Secure

With Halloween just around the corner, there are lots of scary network security stories you might hear or even worse have experienced first hand. Don’t let these stories spook you, but be prepared, they can be unbearable.

The Night that Krack Attacked: A Flawed WPA2

One cold and cloudy October night, an employee comes back to their office to complete a project with a tight deadline. The lights don’t seem to turn on and it’s awfully quiet, with only the sounds of hard drives humming at each workstation. The employee connects to the corporate Wi-Fi network via their computer and so begins the WPA2 security protocol and the process of the four-way handshake, the protocol used in most modern WiFi systems. As this process begins, to ensure the user and access point have the correct credentials to be granted network access, the newly discovered flaw, KRACK, is used by an attacker to intercept this handshake process, force install the same encryption key, and then follow through with an attack and decryption of data. This late October night just grew darker with credit card and password information now exposed and a nightmare for IT the following morning. This was the night that KRACK attacked…

Don’t get spooked, here are 3 ways you can enhance your Wi-Fi security against threats like KRACK: https://blog.pulsesecure.net/krack-wpa-vulnerability-3-ways-to-enhance-wi-fi-security/

Magniber, It’s Alive and Only Wants A Few

A monster with unusual tendencies, that of targeting only very specific users in a particular region and ignoring the rest, waiting for its chance to pounce. Now taking over the distribution method of Cerber ransomware, Magniber is a new monster that performs language and geolocation checks to specifically target South Korea. The attack is executed through malvertising and exploiting a memory corruption vulnerability in Internet Explorer. Are you safe in your geolocation?

Magniber source: https://www.scmagazine.com/magniber-ransomware-in-the-wild-only-targets-south-korean-targets/article/701522/

Source: https://blog.pulsesecure.net/spooky-cyber-security-stories/

Author: Stephanie Briggs


  • 0

KRACK & WPA Vulnerability, 3 Ways to Enhance Wi-fi Security

Category : Pulse Secure

Security researchers recently announced vulnerabilities in WPA2 encryption, practically used everywhere since WEP went the way of the dodo. The implications of the discovery are clear:

  • The attack works against all modern protected Wi-Fi networks
  • If your device supports Wi-Fi, it is most likely affected

This means threat actors are able to see your traffic, hijack connections, and perform man-in-the-middle attacks. So, is WPA2 also going the way of the dodo? Not exactly. Manufacturers are rolling out fixes – they were notified as early as August.

But it’s time for us to see wireless as a shared medium. Where a cable allows for a direct, physical connection, the nature of wireless is that it’s accessible to everyone. On a shared medium, you want to know who exactly is on it, and give them the appropriate level of access. No baddies spying on you or impersonating your users.

Here are 3 ways to enhance your Wi-fi security:

Tunnels shield you from the elements

Instead of relying only on traditional WPA2, opt for best in class security – custom ciphers with a dedicated SSL VPN connection. Attackers see only an encrypted tunnel of traffic, no eavesdropping allowed

Are you who you say you are?

Look for a BYOD-ready network access control solution with automated, self-service onboarding of devices that give only authorised devices access, and intelligently restricts the unauthorised

Please come back when you’re healthy

Host checking comes in handy to ensure end points are in compliance before they enter your network. Virus definitions? Latest patches? Peace of mind? Check.

Source: https://blog.pulsesecure.net/krack-wpa-vulnerability-3-ways-to-enhance-wi-fi-security/

 


  • 0

Buy one appliance and get the second one free

Category : Pulse Secure

Modernize your enterprise VPN with the latest Pulse Secure appliances, software and services at a reduced cost and empower your workers with the trusted secure access that 20,000 customers know and love. Secure the future today to deliver and scale new IT services tomorrow.

A free PSA5000 or PSA7000 when you buy the same appliance with the Pulse Access Suite.

Buy the Advanced or Enterprise Suite Editions and you can extend this buy-one-get-one-free offer to platform options such as license server software (with member licenses) or ICE (in case of emergency) licenses.

*This offer is only available for the PSA5000 and PSA7000 with a minimum purchase of Pulse Access Suite licenses per hardware pair. Find the complete terms and conditions here.

If interested  CONTACT US!


  • 0

6 Dangerous Misconceptions about Network Security

Category : Pulse Secure

When assessing or implementing network security, misconceptions can be dangerous, leading your company’s data to be at risk and, with it, your reputation, your revenue, and possibly your business. With that in mind, be on guard against these six insidious misconceptions:

1. Threats only come from the outside. This is a common misconception, but the truth is that most infiltration issues and security breaches happen from inside the network. While this could be due to a malicious employee, most often it is simply the result of ignorance. For example, an employee may bring his own device and use it for work – but it is unsecured. Another person may have a hub sitting underneath her desk to which she connects multiple machines – some of which are personal. You must have a diligent secure access strategy in place that includes internal security compliance to prevent such security risks.

2. Our employees would never fall for a phishing scam.Yes, they would. And they do. Phishing is very sophisticated nowadays, with spear phishing campaigns that are personalized and tailored to a specific individual. Even a savvy employee can fall prey to an email that looks and sounds authentic.

3. Network access control (NAC) is too difficult to use.Five years ago, that may have been the case. NAC was hard to understand, tough to implement, and irritating for the end user. With business trends evolving to support initiatives like BYOD and IoT, however, network access control has also adapted to meet such demands. For example, Pulse Secure’s NAC solution, Policy Secure, is streamlined, simplified, and user-friendly. You can easily profile your network and get a clear picture of exactly what is residing on it and connecting to it, both internally and externally. Plus, you can gain full visibility into which people and devices have access to what data.

4. Our firewall checks everything. It may – but the danger of using VPN components that are offered by next-generation firewalls is that they don’t always perform enough checks. Contrast that with a Pulse security solution that validates software patches, apps, and other elements through host-checking capabilities prior to allowing them on the network as well as during connections, and you’ve got yourself a fast and reliable secure access solution that will protect your company’s data yesterday, today, and tomorrow.

5. The cloud is secure. We want to believe this, but it’s not that simple. The cloud is where everything is going; in essence, we are moving to huge server farms hosted by large organizations such as Google or AWS, and their primary product offering is space, processing power, and bandwidth – not security. That is their niche and their expertise. To protect that space, you must look to the secure access experts for the best security platform solutions that can be deployed across hybrid IT environments.

6. Our security is good enough. This is the biggest and most dangerous misconception of all: companies assume that if their security was good enough last year or three years ago, it is good enough today … even if it hasn’t been updated in recent history. So, before you say, “Our security is good enough,” ask yourself: are you willing to bet your business on that? Ransomware can get through VPNs or open ports outside the network, potentially encrypting your entire network. Don’t jump onto this bandwagon too fast: your network security could be on the line.

Maybe yesterday’s network security isn’t good enough. If you’re serious about security, it’s time to do some serious security upgrades.

Learn more about the importance of upgrading hardware here.

Source: https://blog.pulsesecure.net/6-dangerous-misconceptions-network-security/

Author: Jeremy Allen


  • 0

Lives Are on the Line with IoMT in Healthcare

Category : Pulse Secure

A patient lies on his bed. A furrow of concern crosses his brow. He presses the call button and a nurse arrives. She checks his heart monitor, assures the patient that all is well, and leaves. An hour later, the patient goes into cardiac arrest. This could have been prevented if the heart monitor had shown the correct information – but it didn’t. As part of the Internet of Medical Things, the heart monitor malfunctioned due to an external cyberattack.

In general, the Internet of Things (IoT) causes people concern because they are worried about their personal data being breached and sold. The serious nature of identity theft, credit card fraud, and stolen funds cannot be minimized. But when it comes to the Internet of Medical Things (IoMT), the stakes are even higher: lives are literally on the line.

Today’s hospitals and healthcare systems are tremendously complex, with medical devices connected to networks that house patient data. The lure of this personally identifiable information (PII) makes healthcare organizations a major target for hackers, as seen in the recurring headlines of hospital breaches. But healthcare organizations must take into consideration the physical dangers, too. For example, if ransomware shuts down critical medical devices or inhibits the transmission of data to and from these devices, patients’ lives are endangered.

To counter sophisticated threats that involve the IoMT, healthcare organizations need to employ a three-fold plan:

  1. Get a Clear View of All Devices

Visibility is the first critical step. An estimated 10% to 20% of medical devices in hospitals are connected, and that number is growing rapidly.[1] All connected devices need to be identified so that each one can be protected.

  1. Set – and Enforce – the Rules

Once visibility is established, security policies can be instituted based upon device categories. For example:

  • Does the device require access to the data center? If data is being pushed to or pulled from the data center, the device is a prime target for hackers.
  • Does the device sustain human life? Devices that play a critical role in sustaining life require strong security policies to protect patients.
  • Is the device easy or hard to exploit? Unfortunately, many older devices are extremely easy to exploit. They may not even have password protection. Such devices need security policies – and, often, risk remediation – to counter their vulnerabilities.
  • Who requires access to the data being collected? Policies may dictate that a medical technician can only access basic data from a certain device, whereas a doctor may be granted access into a patient’s information.

Policies should be set at the granular level and rigorously enforced with both the business and patient in mind.

  1. Be Cryptic

Securing medical devices is not enough: data in transit must also be secured through strong encryption. For example, a VPN or SSL tunnel can be used to secure data on the wire as it travels to or from an IoMT client or server. Without encryption, data can be breached while it is in motion, with ramifications for both healthcare systems and patients.

It is not a scare tactic to say that lives are on the line with IoMT in healthcare. It is a simple statement of fact. But with visibility, security, and encryption in place, hospitals and healthcare organizations can protect both the data, the health, and the lives of the patients who rely on them most.

Healthcare organizations worldwide are choosing Pulse Secure for their secure access solutions.

Check out our latest healthcare customer success video below.

[1] The Healthcare Information and Management Systems Society (HIMSS)

Source: https://blog.pulsesecure.net/lives-line-iomt-healthcare/

Author: Ganesh Nakhawa


  • 0

4 Ways vADC Can Transform Your Business

Category : Pulse Secure

Chances are, your company has a hybrid IT environment composed of a traditional data center, a cloud infrastructure, virtual environments, remote services, mobile access, and legacy systems. You have undoubtedly discovered that providing secure access and connectivity between any user and any device to any kind of service is – to put it mildly – a challenge.

However, delivering secure access solutions for people, devices, things, and services is our mission at Pulse Secure which means we are up for the challenge. We recently acquired Brocade’s virtual application delivery controller (vADC) solution to augment the Pulse product portfolio and offer a secure access platform and comprehensive secure access solution.

A virtual application delivery controller can transform your business by extending the footprint of secure access in four key ways:

1. Secure access for enterprise applications
Whether your remote users are sitting in an airport or giving a presentation to a potential customer, they need access to your classic SharePoint or Office-based applications, as well as to your CRM or ERP systems such as SAP, WebDAV, or Salesforce. vADCgives you end-to-end secure access to all enterprise applications in a highly-scalable solution that incorporates best-in-class role-based access control. With “triple-A” functionality, you have the Authentication, Authorization, and Audit capabilities that are crucial for securing your enterprise applications.

2. Secure access to consumer-facing web applications
Secure access is not limited to your company users. Because Pulse vADC has a world-class virtual web application firewall, you are able to extend secure access to consumer-facing web applications. Therefore, as you deliver virtual services to your customers, you can have confidence that your network – and your customers – will remain secure at all times, protected from cyberattacks.

3. Local and global load balancing
As you adopt a software-defined data center architecture, your data center becomes highly distributed. Local and global server load balancing is crucial to maintain both performance and security across the network.

Pulse Secure’s vADC delivers intelligent load balancing at both the local and global levels for highly-scalable and highly-secure solutions. Suppose you have several network gateways located in North America and Asia-Pacific. A user who normally lives in San Jose, California travels to Singapore. The vADC will note where the user is currently located and where the nearest services are located. Instead of routing the user’s connectivity back to the San Jose gateway (the usual connection), it will make the switch to the Singapore gateway – enhancing the user experience with optimal performance.

4. Accelerates momentum into cloud platforms
You likely have services running in the cloud, or have adopted SaaS services as part of your IT infrastructure. Through the Pulse vADC, you can extend your platform to provide seamless, secure access to your cloud infrastructure. Single sign-on capability ensures a frictionless user experience while simplified administration lets you centrally manage access policies for SaaS, cloud, and data center applications and services.

Your hybrid IT environment – no matter how complex, distributed, and extensive – doesn’t have to cause you security concerns. Pulse vADC solutions provide fast, reliable application delivery across your virtual and cloud platforms at massive scale. So now the question is, are you ready to transform your business with vADC?

Source: https://blog.pulsesecure.net/4-ways-vadc-can-transform-business/

Author: Prakash Mana


  • 0

Frost & Sullivan Define How Pulse Secure is Differentiated in the NAC Global Market

Category : Pulse Secure

Larger technological developments have made NAC solutions an essential part of network security with revenues expecting to increase by 30.7% YoY. An exceptional NAC solution provides a comprehensive network security platform that enables endpoint visibility and contextual awareness. Are you getting full comprehensive insight into your network and if not, how can you find an exceptional NAC solution to deploy across your corporate network?

In this Frost & Sullivan NAC Market Research Report:

  • Discover what technological developments are making NAC essential to network security
  • Find out the key factors driving NAC sales and how this provides unique value to customers
  • Learn how Pulse Secure’s NAC solution, Pulse Policy Secure, offers the most comprehensive network security platform in the market

  • 0

To Upgrade or Not to Upgrade Your Hardware, that Is the Question

Category : Pulse Secure

When you think of security, you probably think “software” first. But software runs on hardware, and if your network security and access appliances are aging, your security profile may be crumbling – without you being aware of it.

Your network security and access appliances sit at the edge of your network, determining who can be let into the network and how much access they should be given. Since security threats are evolving by the day, these appliances need up-to-date software to appropriately protect your company and users from harm. But have you considered the vulnerabilities of outdated hardware appliances? If your appliances are three or four generations old, the latest software versions are likely not compatible with your hardware, so you’re left running out-of-date software.

This leaves you with two choices:

  • Upgrade your hardware so that you can get the latest software to maintain robust protection, or,
  • Keep your current hardware and entrust the security of your network to out-of-date software.

Frequently, companies choose the latter option. After all, their hardware appears to be working, so why upgrade it? An admin may think, “As long as my end users aren’t calling me to complain, everything must be working fine.” Unfortunately, “working” does not equal “secure.” For example, suppose you use OpenSSL for your backend services. Over the past few years, OpenSSL has identified several vulnerabilities. Hackers know this, so they look for devices running older versions of OpenSSL to exploit. At Pulse Secure, we monitor for such events and quickly provide patches in our software updates. But if your appliance can’t run the latest security software and you’re using an older version of OpenSSL, you are wide open to an attack.

That is just one example among the hundreds and thousands of enhancements and updates constantly being created to address new risks, threats, and vulnerabilities.

Aging hardware is also a risk because it will ultimately fail at some point. That is a generally-accepted principle when deploying hardware: there is a mean time between failures. It is why equipment is only guaranteed for a certain number of years. After that, the likelihood of failure becomes statistically high.

Aging hardware therefore presents a double risk: you may suffer a breach because of out-of-date security software, and you might completely lose functionality because of equipment failure. Both eventualities will leave you scrambling to repair the damage. The good news is, you can prevent a catastrophic situation by being proactive in upgrading your network security and access appliances.

Upgrading hardware not only prevents security breaches, but it also brings quantifiable value to daily business operations. For example, at Pulse Secure, our security software updates include new features to make deployment easier through wizards – so what took 30 steps before may take just five now. By minimizing the clicks, we streamline administrative tasks, saving you both time and money.

Plus, with every new generation of hardware comes leading-edge components: memory, processors, hard disks, network interface cards, etc. New hardware can handle more users and manage traffic faster and more reliably than ever so you can do more with less.

Take a hard line when it comes to upgrading your hardware. You will gain increased security to meet today’s sophisticated threats, reduce your network complexity, improve productivity, enhance the user experience, and lower your bottom line costs. The only thing you lose is the experience of getting hacked … and we can all do without that.

Source: https://blog.pulsesecure.net/upgrade-not-upgrade-hardware-question/

Author: Stephanie Briggs


Support