Pulse Secure, the provider of Secure Access solutions, announced its designation as a Distinguished Vendor in this year’s ‘2019 TAG Cyber Security Annual’.
Pulse Secure recently became a member of the world’s leading cybersecurity vendors as selected by Dr. Edward Amoroso, CEO of TAG Cyber, and added to this year’s report. Each year TAG Cyber publishes its three-volume report to the IT community for download at no cost. Volume Two of the report also includes an informative interview with Pulse Secure CEO, Sudhakar Ramakrishna.
Assisting chief information security officers
This year’s ‘TAG Cyber Security Annual’ was developed to assist chief information security officers (CISOs) and security teams as they advance their information enterprise cybersecurity protection programs and best practices. Beyond offering a ‘periodic table’ of cybersecurity controls, the volume offers insights as to key control trends based on expert and practitioner participation.
Beyond offering a ‘periodic table’ of cybersecurity controls, the volume offers insights as to key control trends based on expert and practitioner participation
“Ed Amoroso and his team have put together a pragmatic compendium of security controls and outlooks that can be readily applied by information security professionals. We are pleased to have participated and to be distinguished in this report as TAG Cybers’ service to the IT community and their best practices are to be commended,” said Sudhakar Ramakrishna, CEO of Pulse Secure.
Expediting multi-factor authentication
The 2019 Tag Cyber Volume Two highlighted key trends within 50 top controls. Key findings within Secure Access controls highlighted in the report include:
- Where initial generations of remote access focused on teleworkers and two-factor authentication, next-generation secure access solutions are increasing effectiveness by expediting multi-factor authentication and integrating with modern cloud and mobility platforms
- Leading secure access vendors are delivering solutions equally focused on user experience with the goal of minimising the steps required to establish secure connectivity
- The future of secure access lies in device-to-cloud, where mobility and embedded controls ensure that authentication, encryption and integrity are in place. While the use of public clouds to host enterprise applications will eventually remove access to the corporate LAN, this function will remain in hybrid mode for several years where traditional remote access will remain in place during this transition period
Simple, robust and interoperable approach
“Ensuring secure access to a multitude of applications and resources is a business imperative that challenges IT as enterprises accelerate data centre virtualisation and cloud computing. As such, organisations are reassessing their technology stack that comprises Secure Access,” said Amoroso.
“Pulse Secure is among leading vendors focused on offering a simpler, more robust and interoperable approach for enterprises as they migrate from remote access to more advanced hybrid IT access protection.”