Bryan Embrey

-October 30, 2018

Avoid data breach spooks with Pulse Secure Access

Here’s an (un)surprising observation: security is useless, regardless of whether it’s network or a front-door lock, unless it’s actually deployed. For example, if you don’t lock your front door when you leave, you shouldn’t necessarily be surprised to find valuable items missing from your home when you return. The same logic applies to your devices: if you don’t use security when accessing applications and resources when working remotely, you shouldn’t be surprised if credentials are stolen or data loss occurs. And now the average data breach costs vendors $4M USD each — that’s a relatively high penalty to pay.

In today’s secure access world, the number of threat vectors increases as more and more workers access confidential and proprietary information from a variety of devices. And, they’re doing it from unsecure locations like airports and coffee shops. To address these challenges, Pulse Secure developed two technologies: always-on VPN and on-demand VPN.

Always-on VPN requires that all remote user traffic flows through the corporate network. This enhances security and compliance by forcing all remote user application traffic through a VPN. But, the feature is location-aware: you don’t necessarily want your local users in a VPN when they’re on the corporate campus. In this case, the VPN is established automatically if users move outside of the corporate network, and the connection is terminated if they come back into the corporate campus.

It’s also frictionless: users don’t need to enter any additional credentials or login information to enable the feature. And, they can’t get around it either — Pulse Secure prohibits any end-user customization of the feature. It’s available within our unified client for MacOS, Windows, Android, and iOS.

On-demand VPN is similar. It establishes VPN connections dynamically when requested from within Pulse Workspace, our enterprise mobility management application for iOS and Android. For example, when a user wants to access an application from within Workspace, a VPN connection is automatically set up for the duration of the connection, keeping data secure and reducing the chance of data leakage.

On-demand keeps user productivity up by removing additional logins. Cloud Secure, our cloud authentication and compliance product re-uses the VPN for single sign-on to applications and resources, reducing the possibility of stolen credentials.

And, in our most recent release, 9.0, it is now supported for Android, the number 1 smartphone platform.

We invite you to learn more about both technologies at www.pulsesecure.net

Check out another Pulse Secure Access blog – Pulse Workspace: Secure Access for BYOD

 

Categories