Documente Academic
Documente Profesional
Documente Cultură
97% 134
DAYS
ENTERPRISES SUFFERED BEFORE BREACHES
A BREACH WERE DISCOVERED
With Pulse Secure
We reduce breaches by 20% (Average $2-3million)
Source of breaches
Open Secure
1
3
2
Human behavior leads the new
device to the open (help) SSID
Open Secure
1
Device auto- joins on Day 2
Comprehensive Access Control
3. Turnkey
Employee/Contractor/Guest? Identity
• Set access policy Correct?
• Allow access to
authorized resources
Allow/Disallow? Switches Firewall
Protected
and WLAN (optional L4-L7)
Resources
Dynamic Security Enforcement
Corporate
Network
Firewall Firewall
Pulse Policy Secure Pulse Connect Secure Pulse Policy Secure Pulse Connect Secure
(SSL VPN) (SSL VPN)
LAN Remote
AGENCY
REMOTE SITE
HQ
User: Adam User: Adam
Role: Finance Role: Finance
Dynamic Security Enforcement
Employee/Contractor/Guest? Unauthorized
• Compliance
• Security alerts
• Appliance health
MDM Integration With Other Partners
Device
• Easy enablement of intelligent Management
mobile-aware security policies
• Starting with Pulse Workspace,
MobileIron and AirWatch
• Consolidated policy Attribute
management, alerting and Mobile Devices Sharing
reporting
Authentication
& Authorization
MDM Partners
MobileIron
AirWatch
Device Classification Compliance Extended Reporting
Differentiated access Query MDM (at admission Link to MDM from Pulse
Workspace based on device type. and periodically) for device Policy Secure for
John on iPad gets different posture. If non-compliant, advanced device level
level of access versus limit access and/or reporting.
John on laptop.
remediate.
Regulatory Compliance
PPS for most stringent industry/government compliance regulations
Pulse One
• Centralized, scalable management
Mobility-Ready Turn-Key Solution
• Single gateway runs multiple Pulse Secure offerings Runs on numerous hardware platforms and
• 4 models for companies of all sizes configurations
• Low power consumption Enables elastic demand-based scaling
• Enterprise licensing – perpetual or subscription Supports both VMware and KVM environments
PSA300 PSA3000
PSA5000 PSA7000
How Pulse Secure
Secures - Scenarios
Basic Access Control Enforcement
Finance
Switch
Local User
Video
Juniper or PAN
Firewall Apps
Patch Remediation Corporate Data Center
4 • Policy Secure provisions switch VLAN, ACLs, and QoS for session User attempts to access
• Policy Secure enables role-based policy enforcement on firewall
5 “Finance” data, but is blocked
Unmanaged Device Access Control
Endpoints
Attacker spoofs MAC Profiler detects behavior Policy Secure maps endpoint
4 address, attempts to 5 mismatch, signals Policy 6 to new role, applies restrictive
access network Secure via IF-MAP event access control policies
Enterprise-wide Access Control
Imagine an employee on the
“Sales” user’s device is Remediation successful;
road - “Sales” user logs into 2 3
1 Connect Secure from un-
quarantined for automatic full network access
patch remediation granted via Pulse VPN
patched device tunnel
Federation Data
Server
Finance
Pulse Policy Secure
Juniper
Firewall
Apps
Patch Remediation
Corporate Data Center
Federation Server
Pulse Policy
Secure Profiler
Sensor signals behavior Policy Secure correlates Policy Secure pushes appropriate
change to Policy Secure the anomalous behavior policy to enforcement points,
4 via IF-MAP 5 and network threat to the
6 which take necessary actions
specific device against the device
Mobile Deployment Choices
Supports Native 802.1X client Advanced features supported Cross-platform (desktop &
built-in to Laptops, Tablets, and via Pulse Client for Windows mobile) clientless deployment
Smartphones and Mac OS X option with browser-based
Captive Portal
Differentiators
Pulse One
Policy Services
Datacenter
Email Server
Datacenter
Applications
Server