Pulse Secure

Pulse Secure is a leading provider of secure access solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilise the company’s virtual private network (VPN), network access control (NAC) and mobile security products to enable end-user mobility securely and seamlessly in their organisations.

Why use IP Performance for Pulse Secure?

IP Performance have a long history of supporting the Pulse Secure solution set, from its origin as a Juniper Networks software platform.

We recommend and support the following Pulse Secure products

  • Pulse Secure – SSL Offload

    Pulse Secure vADC is a software-based application delivery controller (ADC) designed to deliver faster and more reliable access to public websites and private applications. Pulse Secure vADC provides the functionality for SSL/TLS Offload, enabling organisations to scale application servers by up to 3x by offloading TCP and SSL connection overhead.

  • Pulse Secure – WAF (Web Application Firewall)

    The Pulse Secure Virtual Web Application Firewall (Brocade vWAF) is a scalable solution for application-level security, both for off-the-shelf solutions, and complex custom applications including third-party frameworks. It can be used to apply business rules to online traffic, inspecting and blocking attacks such as SQL injection and cross-site scripting (XSS), while filtering outgoing traffic to mask credit card data, and help achieve compliance with PCI-DSS requirements by filtering outgoing data.

  • Pulse Secure – vADC (virtual Application Delivery Controller)

    Pulse Secure is a leading provider of secure access solutions to both enterprises and service providers, integrating vADC & WAF products within their proven security suite. Their leading Load Balancing solution was formerly known as ZXTM, STM and the Virtual Traffic Manager (VTM). The solution allows organisations to take control of online applications, enhance customer experience, inspect traffic in real-time, control service levels to differentiate users and services, and reduce costs with an extensible delivery platform that can grow with business needs using ADC-as-a-Service.

  • Pulse Secure – Privileged user access

    Pulse Secure is a leading provider of secure access solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilise the company’s virtual private network (VPN), network access control (NAC) and mobile security products to enable end-user mobility securely and seamlessly in their organisations.

    Pulse Secure delivers secure access to all company resources via a single unified client or mobile application – dramatically simplifying access and increasing user productivity. Administrators configure contextual access policies to control access based on devices, locations, resources, users and groups, or even endpoint profiling.

  • Pulse Secure – Secure Remote Access

    Pulse Secure is a leading provider of secure access solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilise the company’s virtual private network (VPN), network access control (NAC) and mobile security products to enable end-user mobility securely and seamlessly in their organisations.

    Pulse Secure’s product portfolio includes Pulse Connect Secure (mobile VPN for remote access), Pulse Policy Secure (policy-driven NAC), and Pulse Workspace (Enterprise mobility management).

  • Pulse Secure – Endpoint Security

    Pulse Secure is a leading provider of secure access solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilise the company’s virtual private network (VPN), network access control (NAC) and mobile security products to enable end-user mobility securely and seamlessly in their organisations.

    Pulse Policy Secure is Pulse Secure’s endpoint security offering, employing TNC-compliant host integrity checking, anti-malware checking and patch management over a secure VPN to effect protection of the network and the hosts.