SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Pulse Secure achieves Common Criteria Certification for Virtual Private Network and Network Access Control Solutions

5 Jun 2020

Pulse Secure achieves Common Criteria Certification for Virtual Private Network and Network Access Control Solutions
Contact company
Contact Pulse Secure, LLC
icon Add as a preferred source Download PDF version

Pulse Secure, a renowned provider of software defined Secure Access solutions, announced achieving Common Criteria certification for both its virtual private network (VPN) and network access control (NAC) solutions under NIAP’s most current collaborative Protection Profile for Network Devices (NDcPP).

Pulse Secure’s certified solutions increases cyber security assurance for remote, cloud and on-premises access productivity, visibility and compliance for government agencies, government contractors, as well as private-sector enterprises. Common Criteria certification is governed by ISO/IEC standards bodies and maintained by the National Information Assurance Partnership (NIAP) according to internationally recognised security testing standards.

Encompassing security requirements

The solutions were awarded certification against the most current NIAP approved protection profile

Common Criteria certification listing for Pulse Connect Secure v9.1 (VPN) and Pulse Policy Secure vv9.1 (NAC) can be found respectively on the NIAP website. The solutions were awarded certification against the most current NIAP approved protection profile encompassing security requirements, an evaluation and validation scheme, and rigorous test activities carried out by UL Verification Services Inc. Prior versions of both solutions had achieved Common Criteria certification.

Pulse Secure has been extensively deployed in federal, military and supporting contractor applications to support: Comply to Connect standards, Command Cyber Readiness Inspections (CCRI), 802.1X port-control and DISA STIGs, NIST’s Risk Management Framework (RMF), Host-based Security System (HBSS) and DFAR 252.204-7012 assurance, and Internet of Things (IoT) security initiatives.

Assure increased requirements

In addition, the solutions have also attained FIPS 140-2 Level 1 certification, and are certified on the U.S. DoD Unified Capabilities (UC) Approved Products List (APL) and for JTIC joint warfighting IT interoperability.

“Government IT organisations are always on the defensive, but like commercial entities, they must also assure increased requirements for availability, responsiveness and compliance. This is especially true for users and devices requesting access to and operating on federal and military networks,” said Alex Thurber, Chief Revenue Officer at Pulse Secure.

Secure access challenges

For over a dozen years, Pulse Secure has helped government agencies address secure access challenges for hybrid IT

“Pulse Secure is uniquely positioned to give Federal CIOs the means to advance network and cloud access, situational intelligence, and endpoint protection in a timely and cost-effective way that supports compliance mandates. Our recent Common Criteria certifications serves to further validate the design and effectiveness of our Secure Access platform.”

For over a dozen years, Pulse Secure has helped government agencies address secure access challenges for hybrid IT – efficiently, seamlessly and cost-effectively.

Unified access control

By implementing Pulse Secure, Federal defense, intelligence and civilian agencies can:

  • Assure user experience and protected connectivity with always-on and on-demand VPN, as well as simultaneous and split tunneling
  • Satisfy NIST 800-53 controls and specifications regarding 802.1x, Layer 2 Switch STIG, WLAN Authentication Server Security STIG, and Comply-to-Connect requisites
  • Centrally manage an easy-to-use VPN and NAC/802.1x solution for wired, wireless and remote connections with flexibility for physical, virtual and cloud deployment
  • Gain extensive user insight and unified access control for remote and internal endpoints, whether managed, uncatalogued, unsanctioned or unknown
  • Automate endpoint and access situational awareness and security response through end-to-end visibility, policy-based controls, and infrastructure interoperability
  • Validate device compliance with continuous remote, pre-network connection and post-connection host checking to efficiently find, assess and mitigate exposures
  • Preserve remote and onsite user experience with context-aware identity authentication supporting a range of smartcards, certificate handling and single sign-on (SSO)
  • Leverage build-in User Entity Behavior and Analytics (UEBA) anomaly detection and response
  • Integrate Pulse Secure via open standards that negates single vendor lock

Security access tools

Organisations can centrally orchestrate Zero Trust policy to ensure compliant access to applications

Pulse Secure’s VPN and NAC solutions can be procured separately or as part of its Pulse Access Suite Plus solution set that provides adaptive identity and device authentication, protected connectivity, extensive visibility and analytics, and threat response across mobile, network and multi-cloud environments.

By consolidating disparate security access tools into an integrated platform, government agencies gain easy access for users and a single-pane-of-glass to streamline provisioning, management and scalability. Organisations can centrally orchestrate Zero Trust policy to ensure compliant access to applications, resources and services across distributed network, private cloud and public cloud environments.

On-premise access control

“The federal government continues progress cyber security and data protection capabilities with mandates to be more proactive, vigilant and agile. Beyond broader mobility, IoT and cloud initiatives, recent work from home and increased remote access capacity have expanded threat vectors and attack surfaces – placing greater requirements to modernise disjointed, legacy VPN and NAC solutions,” said Jerahd Hollis, Chief Technology Officer at immixGroup.

“Pulse Secure’s integrated, interoperable and scalable approach to remote and on-premise access control address these challenges and allows agencies to deliver easier accessibility with necessary operational insight, controls and efficiency to satisfy NIST guidelines and achieve Zero Trust readiness.”

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Remote security
  • Security access systems
  • Intrusion detection
  • Wireless security
  • Security software
  • Physical Security Information Management (PSIM)
  • Integration software
  • Cyber security
  • Internet of Things (IoT)
  • Data Security
  • Cloud security
  • Related links
  • Proximity Access control systems & kits
  • Standalone / Networked Access control systems & kits
  • Wireless CCTV cameras
  • Contact Access control systems & kits
  • Related categories
  • CCTV cameras
  • Access control systems & kits
Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Securitas UK & Hays Travel mark 10 years partnership

Securitas UK & Hays Travel mark 10 years partnership

Ranger acquires Universal Fire & Security in South West

Ranger acquires Universal Fire & Security in South West

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec