Data Sheet

Pulse’s Secure Access platform (Pulse PSA Series Appliance Family) delivers a universal compliant-ready, from FIPS to Common Criteria, solution.

Added:
Solution Brief

 For over a dozen years, Pulse Secure has been helping federal civilian, intelligence, and Department of Defense (DOD) agencies do exactly that – swiftly, seamlessly, and cost-effectively.

Added:
Whitepaper

 Advanced persistent threats (APT) and insider threats are the two most acute security threats. These threats not only cause significant damage to national security, but also impact organizational momentum and have enormous cleanup costs.

Added:
Data Sheet

Pulse Policy Secure (PPS) is an easy, flexible and interoperable NAC solution that provides visibility with security enforcement, to control managed, unknown, and IoT devices connecting locally or remotely to the network.

Added:
Data Sheet

Powered by Farsight Security. ThreatSTOP proactively blocks newly observed domains to fill a challenging gap for companies.

Added:
Data Sheet

Protect your devices when they leave your network - anywhere, anytime.

Added:
Data Sheet

ThreatSTOP's MyDNS is the world’s first and only fully recursive DNS Firewall solution packaged into a light-weight agent, and compatible with all modern Windows and Mac OS X endpoints.

Added:
Data Sheet

ThreatSTOP IP Defense is a powerful service that blocks attacks before they reach your network, and prevents data theft.

Added:
Data Sheet

ThreatSTOP DNS Defense is a powerful service that prevents unwanted and dangerous outbound connections from your network, and prevents data theft. 

Added:
Webinar
Automation Anywhere, with special guest Cognilytica, discuss how Intelligent Automation is transforming our government and the important role that AI plays in the process. View the discussion as they address some of the biggest questions about Intelligent Automation.
Added:
Data Sheet
Security research tools at your fingertips. Plus, it's actually affordable
Added:
Webinar
 Learn how Trend Micro Deep Security can protect your cloud and datacenter workloads against vulnerabilities, malware, and unauthorized changes through a single, unified console.
Added:
Webinar
This webinar will address the top 5 challenges that agencies face during cloud migration and give you the tools to help mitigate those challenges for your agency.
Added:
Other
Gartner estimates 80 percent of all attacks are at the application security layer-making it critical that federal organizations get ahead of the legacy application issues and the development of new applications.
Added:
Webinar

Today, 33% of organizations are planning to adopt one or more security-as-a-service (SECaaS) solutions. The efficiency with which endpoint security solutions can provide protection, particularly when delivered as-a-service, is a key strategic consideration for many organizations – perhaps none more so than America’s network of medical schools and teaching hospitals.

Added: