Pulse Access Suite
The Pulse Access Suite
An integrated solution delivering Secure Access for the Next Generation
The Pulse Access Suite contains all the software and services needed to deliver Secure Access. It’s never been easier to enable new cloud services, secure your data center, provide mobile access and protect your applications and data. We make Secure Access simple to design, deploy and manage.
Security is more than simply point protection. A complete Secure Access architecture spans across all parts of the network, and extends beyond the network to people, devices, applications. It simplifies how your organization interacts with the network, and how applications are deployed in the cloud, with orchestration across all elements in your network.
Pulse Secure solutions let you control access to the cloud and data center from one console, with converged policy management for remote, mobile, and campus access security, as well as unified compliance reporting for laptops, smartphones, and tablets. You can also integrate with back-office systems such as Microsoft Active Directory.
Mobility Management: Ensure security compliance for smartphones and tablets, and a unified client for secure mobile browsing and onboarding for unknown and guest users.
Network Access Control and Visibility: Enforce granular policies for all devices touching your network, including guest users, employees and partners, and classify all devices on your networks and branch offices, using distributed network profiling.
Secure, Scalable Applications: Deploy High-performance and integrated security for multi-cloud applications, with scalable application security for protection against advanced persistent threats.
Cloud Security Management: Manage end-to-end security policies with a cloud-based SaaS solution, and enforce policies and single sign-on to cloud applications and services outside of your datacenter.
Secure IoT: Maintain visibility of every IoT endpoint on your network, and establish strong authentication policies to ensure that only appropriate users can access devices, systems, and data.
|Packaging||Hardware ApplianceVirtual Appliance/VM ImageSoftware ApplicationXaaS(as a service)|
|Categories||Cloud and Virtualization > Other Cloud Infrastructure Solution|
IoT > IoT Networking and Connectivity
Networking > Virtual Network Functions > Acceleration, Optimization and Caching
Networking > Virtual Network Functions > Security, Policy, Identity, NAT
Security > Infrastructure Security, FW, IPS, DDoS
Security > Other Security Solution
Use of the SDxCentral service directory is governed by our Terms of Service, including without limitation those sections under the headings "CONTENT", "LICENSING AND OTHER TERMS APPLYING TO CONTENT POSTED ON THE SDXCENTRAL SITES", "INDEMNITY; DISCLAIMER; LIMITATION OF LIABILITY" AND "COPYRIGHTS". Under no circumstances will SDxCentral be liable in any way for any Content, including, but not limited to, liability for any errors or omissions in any Content or for any loss or damage of any kind incurred as a result of the use of any Content posted, emailed or otherwise transmitted via the Sites.