Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Similar documents
Pulse Secure Application Delivery

Optimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager

Enterprise Guest Access

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Connectivity to Cloud-First Applications

Design and deliver cloud-based apps and data for flexible, on-demand IT

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Accelerate Your Enterprise Private Cloud Initiative

Pulse Policy Secure. Identity-Based Admission Control with Check Point Next-Generation Firewall Deployment Guide. Product Release 9.0R1 Document 1.

Securing Your Most Sensitive Data

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Reaping the Full Benefits of a Hybrid Network

Best Practices in Securing a Multicloud World

align security instill confidence

Next-Generation HCI: Fine- Tuned for New Ways of Working

Elevate the Branch-Office Experience with an Application-Centric Platform

VMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017

Upgrade Your MuleESB with Solace s Messaging Infrastructure

SAS and F5 integration at F5 Networks. Updates for Version 11.6

XenApp, XenDesktop and XenMobile Integration

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Why Converged Infrastructure?

Never Drop a Call With TecInfo SIP Proxy White Paper

Cisco Cloud Application Centric Infrastructure

The threat landscape is constantly

INTRODUCING VERITAS BACKUP EXEC SUITE

VMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

Safeguard Application Uptime and Consistent Performance

Symantec Network Access Control Starter Edition

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

Desktop virtualization for all

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Cisco Start. IT solutions designed to propel your business

Networking for a dynamic infrastructure: getting it right.

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

A10 HARMONY CONTROLLER

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

Cisco Borderless Networks Value Proposition

Deliver Office 365 Without Compromise

Next Generation Privilege Identity Management

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

THE NEW COLLABORATIVE WORKFORCE. Enterprise Communications, Advanced.

MODERNIZE INFRASTRUCTURE

What is an application delivery controller?

Symantec Network Access Control Starter Edition

A comprehensive security solution for enhanced mobility and productivity

STREAMLINING THE DELIVERY, PROTECTION AND MANAGEMENT OF VIRTUAL DESKTOPS. VMware Workstation and Fusion. A White Paper for IT Professionals

Hitachi Enterprise Cloud Family of Solutions

Symantec Network Access Control Starter Edition

shiftz Citrix virtual desktops and applications on Microsoft Azure Lieven Van de Walle

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

IBM Security Access Manager

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

PULSE CONNECT SECURE APPCONNECT

Nuage Networks Product Architecture. White Paper

Optimizing your network for the cloud-first world

Networking for a smarter data center: Getting it right

CenturyLink for Microsoft

Geolocation and Application Delivery

SOLUTION BRIEF Enterprise WAN Agility, Simplicity and Performance with Software-Defined WAN

Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

The definitive guide to selecting the right ADC for the digital transformation era

Evolved Backup and Recovery for the Enterprise

AKAMAI CLOUD SECURITY SOLUTIONS

Security and Compliance at Mavenlink

HARNESSING THE HYBRID CLOUD TO DRIVE GREATER BUSINESS AGILITY

Securely Access Services Over AWS PrivateLink. January 2019

VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla. Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc.

NEC Enterprise Overview

Build application-centric data centers to meet modern business user needs

Total Threat Protection. Whitepaper

Features. HDX WAN optimization. QoS

by Cisco Intercloud Fabric and the Cisco

Citrix Education Learning Journey

PCI DSS Compliance. White Paper Parallels Remote Application Server

Introduction. The Safe-T Solution

Cisco Collaborative Knowledge

SIEM Solutions from McAfee

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

AWS Reference Design Document

CONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS

SIEM: Five Requirements that Solve the Bigger Business Issues

Secure Access for Microsoft Office 365 & SaaS Applications

App Gateway Deployment Guide

Designing Workspace of the Future for the Mobile Worker

ebook ADVANCED LOAD BALANCING IN THE CLOUD 5 WAYS TO SIMPLIFY THE CHAOS

THE ESSENTIAL GUIDE: SELECTING A CLOUD COMMUNICATIONS PROVIDER

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Introduction to iscsi

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Pulse Policy Secure X Network Access Control (NAC) White Paper

WHITEPAPER. How to secure your Post-perimeter world

Transcription:

DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all users in all locations Secure remote access to onpremise and cloud resources across various desktop and mobile devices Complete visibility and control over access to the corporate network and application resources Flexible enterprise deployment options: physical or virtual appliance to cloud and hybrid Lower total cost of ownership (TCO) Customer Challenges With the rapid adoption of mobile and cloud technologies, Enterprise IT needs to provide uninterrupted secure access service to corporate on premise and cloud resources from any device, anywhere and anytime. Moreover, employees and partners are increasingly using their own devices to connect to critical applications, resulting in new security challenges into the network. The Pulse Access Suite solves the anywhere and anytime enterprise challenge, starting with Pulse Connect Secure, a seamless and cost-effective, SSL VPN solution for remote and mobile users from any web-enabled device to corporate resources. Pulse Connect Secure is the key component to Pulse s Secure Access solution, providing anytime access In order to meet the demanding scale and complexity of global enterprise IT deployments, customers must install load-balancing appliances with the secure access solution to support the increased security and performance needs. With the addition of the Pulse Secure virtual Application Delivery Controller (vadc) solution IT professionals now have a much more powerful platform to enforce application security out-of-the-box as applications scale out to meet the surge in demand. Pulse Secure vadc delivers the most comprehensive deliver secure access to support global enterprise from legacy data center applications to web, cloud and even mobile applications. More than just a load balancer, Pulse vadc transforms applications to make them more secure and responsive, and integrates with the Pulse Access Suite. This solution creates a powerful end to end solution for secure access to all applications, regardless of location or type: reducing costs, while improving user satisfaction and security. 1

Pulse Secure Access with Pulse Secure vadc The Pulse Secure Access Suite helps enterprises boost worker productivity with seamless, mobile access to the data center and cloud while offering complete visibility and control over access to the corporate network and application resources. Key capabilities include: Unified policy across wired and wireless connections, personal and corporate devices, remote and local access Embedded certificate-based authentication with per-app VPN provides a seamless user experience Integrated access control with SAML facilitates seamless use of cloud and datacenter services/applications Unified control and visibility of access for desktop and mobile devices Ensure only authenticated users and secured devices have access to the corporate network and IT resources Profiler to discover network endpoints for verification and remediation Once enterprises achieve Secure Access, users enjoy the benefit of being increasingly mobile and can work from anywhere in the globe from their BYOD devices. However, the challenge for global IT organizations is to build out a highly scalable and resilient architecture to support capacity and performance, while keeping the TCO (total cost of ownership) in check as more capacity is needed. Pulse Secure meets the scalability challenge by introducing the Pulse Secure Virtual Traffic Manager (vtm) into your application architecture. Pulse vtm enables the delivery of a highly secure and responsive solution to end-users with enterprise-class capabilities: Global Load Balancing and server health monitoring across multiple sites Intelligent service routing to handle traffic surges and disaster recovery Compatible and interoperable with existing hypervisor and cloud infrastructure Application-aware optimization for virtual and cloud services N+M clustering for increased reliability and scalability Micro-segmentation of users and data spaces Secure Access Suite with Virtual Traffic Manager Solution Architecture With the combined solution, users from all locations in the organization have a single logical end point address to access regardless of whether they log in from home or on the road. The traffic will always be routed to the node that provides the best user experience. Even in extreme conditions such as a snow storm or failure of one of the data centers, the enterprise customers will continue to enjoy uninterrupted access to all the resources that are on-premise or in the cloud. Location A Switch Firewall Protected Resources Wireless LAN Secure Access Suite Saa Pulse Workspace Location B Pulse Client Virtual Traffic Manager (Running on VA or in the Cloud) Switch Firewall Protected Resources Wireless LAN Secure Access Suite The combined solution of Pulse Connect Secure and Pulse Secure vadc lets users from all locations in the organization have a single logical end point address to access. 2

Global Load Balancing directs traffic to the optimum location. Global Load Balancing The Pulse vtm goes beyond a regular load balancer. A typical server load balancer forms a fault tolerant cluster within data centers and distributes work load evenly among the nodes in that cluster. When hardware failures occur in one or more nodes in the cluster, the remaining nodes will continue to function without end users noticing any down time. Similarly, new nodes can be added to the cluster to increase capacity and performance. This works well in an isolated data center deployment, but it is inadequate in today s global business where user traffic could shift dynamically across different geographies and time zones. The failure of one data center could create a cascading impact to the whole organization. The Pulse vtm supports Global Load Balancing (GLB) where user application traffic is routed to multiple data centers across different locations. This removes the potential for a single point of failure caused by one data center becoming unavailable, reducing risk and improving performance. By load balancing each user to the best data center in terms of performance, proximity and other criteria as defined by the administrator, the GLB also delivers the best possible level of end user experience. For example, using vtm s GLB location based services with Pulse Connect Secure, VPN clients can reach out to the nearest VPN gateway with optimal gateway selection, greatly reducing latency of secure VPN connections. Cloud Portability Cloud and virtualization technologies have freed organizations to not only move resources around their own data centers but also into more cost-effective private and even public cloud locations. However, as enterprises decide how and where to deploy applications, there are performance and security considerations that can impact their choices. Different applications have different needs in terms of availability, performance, and security, which can dictate whether an enterprise can deploy resources on-premises or in a cloud environment. IT architects need a solution that will give them the flexibility to choose any combination of deployment options to support the varied, ever-evolving needs of their business and applications. Pulse Connect Secure with Pulse vadc provides complete cloud portability to enable organizations to build applications that are agile enough to take advantage of resources across domains, to maximize the benefits they can derive from hybrid cloud environments. Additionally, with the Pulse vadc you can enable seamless load balancing to VPN termination gateways whether they are on-prem or in the cloud. 3

Pulse vtm supports simple scale-out clustering. Simple Scale-Out Clustering Pulse vtm has unmatched scale and performance and is able to scaleup with the latest generation of multi-core CPUs and scale out with N+M clustering for reliability and throughput. No matter what your workload, it can scale to deliver performance and security without compromise. You can configure application policies once, and the policies will be synchronized across the cluster automatically. Whether you need to cluster for performance, for reliability or for policy synchronization, Pulse vadc allow you to scale out dynamically to meet changes in workload, changes in your cloud architecture, or to manage multiple applications in a consolidated security platform. Fine-Grained Access Control Once users are authenticated into a network, there remains the question of which content users are entitled to access. While many secure document management applications support permission groups, there is still the need to track content requests, and to allow/ deny based on central policies. This ability to maintain separate spaces for users and datasets based on business policies is known as micro-segmentation. Pulse vtm can conduct a deeper level of identity verification for users seeking access to specific stores of protected information and executes policies tailored to specific user attributes. Organization can achieve this by introducing additional attribute checks derived from third-party sources, such as an organizational database containing a user s employment status, security permissions, and job function. For example, when an authenticated user logs in to a network and accesses a particular application, Pulse vtm can be configured to query an external database to verify that the user is allowed access to that application and its associated data sets. Pulse Policy Secure compliments these capabilities but offering policy enforcement in a granular manner, such as 802.11x based authentication. As a result, access to data becomes more segmented and subject to auditable parameters, enabling IT teams to have better visibility and a deeper level of control over who is accessing what data and how. For example, an attribute check may find that a user is not allowed access to an application or a particular set of data, or that the user is allowed access but only for certain dates and times or only for certain subsets of data Solution Components The Pulse Secure Access Suite and the Virtual Traffic Manager supports flexible enterprise deployment options: physical or virtual appliance to cloud and hybrid. They can be easily added into enterprise customer s existing infrastructure footprint and be future proof as the organization infrastructure evolves. Summary As the number of malicious software and ransomware cyber-attacks increase in scale and complexity, the need for Secure Access has never been greater. With BYOD and an evolving mobile workforce across many global locations, achieving Secure Access for the whole organization can be a daunting task. With the addition of the Virtual Traffic Manager to the Secure Access Suite, the combined solution harnesses the security, scalability, high availability and more importantly the productivity boost to maximize the enterprise s return on investment (ROI). Some of our customers have already benefited from it, why wait? 4

About Pulse Secure Pulse Secure s mission is Delivering Secure Access Solutions for people, devices, things, and services. Remote Access to data center resources has evolved to Secure Access where the location and type of resource being securely accessed is more than just data centers, including Cloud/SaaS applications, and Mobility. Devices must be secured whether outside or inside the organization, laptop or mobile. Pulse Secure Access Suite is a comprehensive Secure Access solution that securely connects workers to company resources and protects company devices, regardless of location in the data center, cloud or mobile. Pulse Secure delivers access to all company resources via a single client or mobile application dramatically simplifying access and increasing user productivity. Pulse Secure is well positioned to deliver comprehensive Secure Access, given our 15+ years of experience, over 20,000 customers and 20 million endpoints. Corporate and Sales Headquarters Pulse Secure LLC 2700 Zanker Rd. Suite 200 San Jose, CA 95134 www.pulsesecure.net Copyright 2017 Pulse Secure, LLC. All rights reserved. Pulse Secure and the Pulse Secure logo are registered trademarks or Pulse Secure, LLC. All trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Pulse Secure assumes no responsibility for any inaccuracies in this document. Pulse Secure reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Pulse Secure vadc Datasheet 080217 5