Pulse Secure has a long history with public sector agencies to secure networks, meet compliance mandates, and boost productivity.
Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services that improve visibility, protection and productivity for our customers. Our suites uniquely integrate cloud, mobile, application and network access to enable hybrid IT in a Zero Trust world. Over 20,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.
Pulse Secure understand the pressures that providing Secure Access to the nation's critical IT infrastructure can bring;
Pulse Secure provides end-to-end access protection for Civilian, Intelligence, and Department of Defense Agencies:
Pulse Secure has a long history with US agencies to secure networks, meet compliance mandates, and boost productivity.
Purpose built with the throughput and capacity to support Secure Access growth, the means to centrally manage and deploy in the data center and multi-cloud.
Platform Options for Added Scale and Flexibility
PSAs can be outfitted with platform options that boost performance and deployment scale.
In Case of Emergency (ICE)
The ICE option allows use of the maximum capacity of the appliance for a temporary period. Use this licensing option to quickly add appliance capacity when confronted with natural or man-made disasters.
Manage and distribute appliance licenses from a centralized license server to easily adapt your deployment to your changing business needs. License servers can be deployed as a physical appliance or a virtual appliance. Note that Member licenses are required for physical appliances with supporting perpetual licenses.
Government IT organizations must demonstrate and maintain compliance with a large and growing number of regulations and standards governing network access control (NAC) and remote access. For over a dozen years, Pulse Secure has been helping federal civilian, intelligence, and Department of Defense (DOD) agencies do exactly that – swiftly, seamlessly, and cost effectively.
The Pulse Secure solution provides a holistic solution for local and remote access based on user and device identity. Administrators configure contextual access policies on Pulse Connect Secure to control VPN access to the data center based on devices, locations, resources, users and groups, or even endpoint profiling. Pulse Policy Secure with the Pulse Profiler extends policies to internal networks, allowing organization to identify, profile, secure and manage internal devices while also providing NAC policies for enforcement by a growing ecosystem of third party security solutions. Pulse One provides centralized management and reporting to provide complete visibility and meet the needs of the most stringent compliance environments.
Pulse Policy Secure, our high-performing and scalable NAC policy server, is founded on robust industry standards, including 802.1x and RADIUS. It secures your network by:
Pulse Secure has been extensively deployed in Federal, military and supporting contractor applications to support: 802.1X port-control and DISA STIGs, NIST’s Risk Management Framework (RMF), Comply to Connect standards, Command Cyber Readiness Inspections (CCRI), Host-based Security System (HBSS) and DFAR 252.204-7012 assurance, and Internet of Things (IoT) security initiatives.
DISA’s STIGs (Layer 2 Switch, WLAN Authentication Server Security) and 802.1x Mandates
Agency’s facing authentication requirements, such as the DISA’s Layer 2 Switch STIG that mandates enabling 802.1x authentication, are often presented with an expensive and often complex rip and replace proposal. Pulse Secure AAA/RADIUS authentication server, which enables 802.1x authentication, integrates seamlessly with an agency’s existing infrastructure via open standards - lowering agency total cost of ownership (TCO) and maximizing return on investment (ROI). Leveraging our proven RADIUS approach, secure connectivity is enabled via existing endpoint, network switch and wireless AP.
Internet of Things
US DHS has alerts agencies on IoT exposures such that there are “multiple opportunities for malicious actors to manipulate the flow of information to and from network connected devices,” and as such, DHS further advocates that agencies define network access controls to limit IoT devices to specific ports and to structure network permissions related to the IoT device’s use. Pulse Profiler, founded on the RADIUS server, dynamically discovers, classifies and assesses all endpoints including IoT devices – dynamically applying access policy based on what the device is, is it sanctioned, what it should be doing, and where it should be connecting. Pulse Policy Secure automatically enforces IoT policy based on policy and behavior including managing sponsor-based IoT devices access, granting access, blocking access or placing IoT devices into isolated network segment. From network-enabled surveillance cameras and printers, to unauthorized WiFi Aps and storage, Pulse Policy Secure offers real-time IoT security.
Comply to Connect
Comply to Connect directives demands that any endpoint be vetted against established security requirements prior to allowing sanctioned devices to connect to an agency’s network. Some vendors enable Comply to Connect in an agentless mode which introduces security issues such as: Layer 3 access prior to compliance assessment, delayed enforcement due to polling cycles and reliance on risky remote WMI connectivity (a showstopper for most agencies). At Pulse Secure, we support agentless mode but recommend our Pulse Secure agent for Layer 2 compliance checking prior to network access, always-on and continues monitoring and enforcement, and direct, multi-factor endpoint inspection without remote protocol use.