SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Pulse Secure ensures enhanced enterprise security posture with automated network visibility, IoT deployments and threat mitigation

25 Jul 2018

Pulse Secure ensures enhanced enterprise security posture with automated network visibility, IoT deployments and threat mitigation
Contact company
Contact Pulse Secure, LLC
icon Add as a preferred source Download PDF version
Related Links
  • Pulse Secure introduces Virtual Application Delivery Controller for enterprise management
  • Pulse Connect Secure 9.0 simplifies secure access to applications in cloud and hybrid IT environments
  • Pulse Secure to discuss implementing network access control during SANS Webinar

Pulse Secure, global provider of enterprise Secure Access solutions has announced the release of Pulse Policy Secure 9.0 to enable organisations an easier, flexible and VPN-integrated path to next-generation Network Access Control (NAC). The latest release incorporates more than 36 new features and enhancements; advancing visibility, usability, endpoint and IoT security, and threat response capabilities. As a result, enterprises can strengthen their security posture and mitigate malware, data breaches and compliance risks.

“With growing attacks, BYOD and data privacy issues, enterprises must get a handle on users, endpoints and IoT devices accessing their network resources,” said Tony Massimini, senior industry analyst at Frost & Sullivan. “Pulse Secure is distinguished by offering the benefits of both pure-play and infrastructure NAC providers. Unlike infrastructure NAC, Pulse Secure is integrated and works with popular switches, wireless, and security infrastructure to facilitate deployment and threat response. Unlike pure-play NAC offerings, Pulse Secure offers VPN and NAC solutions that amalgamate mobile, cloud and network oversight. The combination delivers enterprise value for user, endpoint and IoT visibility, as well as threat response.”

Pulse Policy Secure Pulse Policy Secure (PPS) is an enterprise-class NAC solution that delivers network visibility, “comply to connect” policy enforcement and security orchestration

Pulse Policy Secure (PPS) is an enterprise-class NAC solution that delivers network visibility, “comply to connect” policy enforcement and security orchestration with popular switch, wireless controller, NGFW, SIEM, EMM and endpoint security solutions. PPS tackles the challenges of securing corporate networks, which are being redefined by Hybrid IT, mobile devices and IoT. Frost & Sullivan predicts that IoT connections will reach 45.4 billion by 2023. IoT brings new exposures as mobile, wearables, medical and other IP-enabled devices are introduced to the corporate network.

Policy Secure 9.0 boosts compliance enforcement with broader endpoint discovery mechanisms, vulnerability assessment to prevent malware attacks such as WannaCry, as well as OS and patch management verification to safeguard Windows and macOS devices. Beyond supporting TACACS+ for role-based network device support, the release also streamlines user experience by incorporating host checking caching, directory, authentication and firewall integration techniques to reduce login prompts, authorisation and device compliance time.

Pule Profiler and Secure 9.0 Pulse Profiler, sold separately or integrated within PPS, automatically identifies managed and unmanaged devices

Pulse Profiler, sold separately or integrated within PPS, automatically identifies managed and unmanaged devices (e.g. printers, VOIP phones, cameras) that are connecting to the corporate network. The system dynamically monitors for device profile and security state changes. The new version further extends IoT device discovery, classification and management features with added means to ascertain new and custom IoT devices, and to apply policy for conditional access.

Policy Secure 9.0 further enables threat response orchestration. PPS can share identity and endpoint information with popular network and security infrastructure, as well as receive network policy enforcement requests from external solutions. The release extends integration with Palo Alto Networks, Checkpoint, Juniper and Fortinet firewalls to enrich their operational context, as well as to allow the firewall to invoke NAC endpoint network segregation or blocking.

IoT Security and threat mitigation Organisations understand NAC advantages for visibility, IoT security and threat mitigation"

"Organisations understand NAC advantages for visibility, IoT security and threat mitigation, but perceive the technology to be cumbersome. The latest release of Pulse Secure NAC continues to advance our deployment, usability and integration capabilities while delivering enterprise-class functionality,” said Scott Gordon, chief marketing officer at Pulse Secure. “With our unique means to offer a simple, unified NAC and VPN solution, we allow enterprises to gain essential intelligence, compliance and protection for remote, cloud and data center access.”

Pulse Secure offers organisations an easy, flexible and scalable path to next generation NAC:

  • Start with the Pulse Profiler for dynamic endpoint and IoT device visibility, assessment, inventory and monitoring
  • Deploy Pulse Policy Secure for automated guest management, mobile on-boarding, endpoint remediation, network enforcement and threat response
  • Streamline implementation with wizard templates and the means to phase in access enforcement, network coverage, and core integrations
  • Scale cost-effectively with the PPS appliance, which includes a high-performance RADIUS server supporting up to 50,000 concurrent devices
  • Centrally manage appliances and over a million endpoints though the Pulse One console
  • Simplify and expedite NAC deployment for Pulse Secure VPN customers by leveraging the same user client, policy framework and centralised management console

Network Access Control solutions The evolution of Network Access Control solutions is critical to the security industry"

"We are seeing more IoT deployments especially within our larger clients in healthcare and manufacturing and we welcome the enhancements to Pulse Policy Secure that help to discover and protect a wider array of devices,” said David Hood, MD of ANSecurity,

“The evolution of Network Access Control solutions is critical to the security industry and deeper support for next generation firewalls and other security platforms offered by the new 9.0 release will go a long way towards helping organisations to simplify security in what is an increasingly complex infrastructure landscape.”

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Remote surveillance
  • Electronic security systems
  • Remote security
  • Security access systems
  • Electronic access control
  • Wireless security
  • Hybrid security
  • IP security solutions
  • Mobile communications
  • Internet of Things (IoT)
  • Corporate Security
  • Data Security
  • Cloud security
  • Mobile access
  • Related categories
  • Access control software
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec