Mike Riemer

-May 16, 2020

Verizon DBR and Secure Access Ramifications

As data breaches continue to increase year over year, organizations need to understand the secure access ramifications that arise from these cyberattacks. In our recent 2020 Zero Trust Progress Report, we surveyed more than 400 cyber security decision makers and we found that 72% of organizations plan to asses or implement Zero Trust capabilities to mitigate growing cyber risk.

With financial gain as the main motivational factor behind breaches, and the overwhelming percentage of those breaches being done by compromised credentials, it is imperative for businesses to deploy a Zero Trust model of network access that is both user friendly and secure. Whether remotely connecting or physically in the office, validating user credentials alone is no longer sufficient as those credentials could potentially be stolen. Systems must be able to additionally identify the type of device the attempted access is coming from, the secure posture of that device, as well as the location the attempt is coming from. If any of these characteristics are not within “normal” defined parameters, the attempted access should be denied and recorded.

The dramatic increase in remote workers due to the global pandemic has caused even small businesses to look for access methods that allow for any device (phone, tablet, laptop or desktop) to connect to their corporate networks. This presents a challenge that can effectively be addressed with Zero Trust security, but still requires employee education on Phishing and social engineering threats to mitigate even the first step in the cyber-attack journey. Employee educational awareness together with enhanced access security, enables businesses to reduce their overall threat landscape, allowing them to focus their resources on the remaining attack vectors within their networks.

As workforce mobility, the influx of IoT, and cloud computing continue to change the concept of traditional perimeters, organizations are being required to manage hybrid IT risks and deploy Zero Trust defenses. What do CISOs want now? They are looking for scalable, intelligent, and automated solutions that will improve security posture and operational efficiency.

This is the why Pulse Secure has released an integrated platform solution, Pulse Access Suite Plus, a single-pane-of-glass to streamline provisioning, management and scalability. Pulse Access Suite Plus is a secure access solution set that provides adaptive identity and device authentication, protected connectivity, extensive visibility analytics and anomaly detection, and threat response across mobile, network and multi-cloud environments.

With Suite Plus, organizations can centrally orchestrate Zero Trust policy to ensure compliant access to applications, resources and services across distributed network, private cloud and public cloud environments. Suite Plus works with an organization’s security ecosystem, supports the widest array of applications, all while orchestrating Zero Trust security to reduce the threat landscape.


To learn more, please visit Pulse Suite Plus Overview and explore our comparable Zero Trust capabilities.