Pulse Access Suite
The Pulse Access Suite
An integrated solution delivering Secure Access for the Next Generation
The Pulse Access Suite contains all the software and services needed to deliver Secure Access. It’s never been easier to enable new cloud services, secure your data center, provide mobile access and protect your applications and data. We make Secure Access simple to design, deploy and manage.
Security is more than simply point protection. A complete Secure Access architecture spans across all parts of the network, and extends beyond the network to people, devices, applications. It simplifies how your organization interacts with the network, and how applications are deployed in the cloud, with orchestration across all elements in your network.
Pulse Secure solutions let you control access to the cloud and data center from one console, with converged policy management for remote, mobile, and campus access security, as well as unified compliance reporting for laptops, smartphones, and tablets. You can also integrate with back-office systems such as Microsoft Active Directory.
Mobility Management: Ensure security compliance for smartphones and tablets, and a unified client for secure mobile browsing and onboarding for unknown and guest users.
Network Access Control and Visibility: Enforce granular policies for all devices touching your network, including guest users, employees and partners, and classify all devices on your networks and branch offices, using distributed network profiling.
Secure, Scalable Applications: Deploy High-performance and integrated security for multi-cloud applications, with scalable application security for protection against advanced persistent threats.
Cloud Security Management: Manage end-to-end security policies with a cloud-based SaaS solution, and enforce policies and single sign-on to cloud applications and services outside of your datacenter.
Secure IoT: Maintain visibility of every IoT endpoint on your network, and establish strong authentication policies to ensure that only appropriate users can access devices, systems, and data.
|Packaging||Hardware ApplianceVirtual Appliance/VM ImageSoftware ApplicationXaaS(as a service)|