Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Pulse Secure Unveils Software Defined Perimeter Solution

Pulse Secure, a company that specializes in secure access solutions, this week unveiled a new software defined perimeter (SDP) product designed to provide organizations direct secure access to their resources and applications.

Pulse Secure, a company that specializes in secure access solutions, this week unveiled a new software defined perimeter (SDP) product designed to provide organizations direct secure access to their resources and applications.

Pulse Secure, whose solutions were part of Juniper Networks until 2014, offers a platform that includes VPN, mobile device management (MDM), single sign-on (SSO), device visibility, virtual application delivery controller (ADC), and network access control (NAC) capabilities.

Pulse SecureThe company’s solutions rely on a “zero trust” architecture, which helps protect organizations against both inside and outside threats by maintaining strict access controls and not trusting anyone by default.

With the introduction of Pulse SDP, which is available as an add-on for the Pulse Secure Access platform, these zero trust capabilities are enhanced as all users will be authenticated before being given access to applications.

Pulse SDP includes controller, client, and gateway components that are enabled within the company’s software, hardware and cloud solutions. The new product can be activated by existing customers with a simple software upgrade.

According to Pulse Secure, the new product can be used by organizations for direct secure access to specific applications and resources without the need for a VPN or access to the enterprise network. The new product is designed to continuously verify users, devices and applications before and during transactions.

SDP can also be used to isolate critical applications so that they cannot be accessed by unauthorized users, and it can help organizations securely migrate apps to the cloud, Pulse Secure says.

Administrators can use SDP to temporarily provide users secure access to specific applications regardless of their location, and they are provided deep user authentication and authorization mechanisms that can restrict access based on the type of device and level of authentication.

Pulse SDP is expected to become available in April 2019 as a component of the Advanced and Enterprise editions of the Pulse Secure Access Suite. As for pricing, several options are available. For instance, the Advanced edition with SDP can be acquired with an annual subscription of $66 per user for 1,000 users.

Advertisement. Scroll to continue reading.

Related: Don’t Ignore Identity Governance for Privileged Users

Related: Akamai Acquires Identity Management Firm Janrain

Related: Cloudflare Launches Remote Access to Replace Corporate VPNs

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...