Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

Similar documents
Secure Access - Update

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

SAS and F5 integration at F5 Networks. Updates for Version 11.6

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Secure wired and wireless networks with smart access control

Pulse Policy Secure X Network Access Control (NAC) White Paper

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Maximize your investment in Microsoft Office 365 with Citrix Workspace

ClearPass Ecosystem. Tomas Muliuolis HPE Aruba Baltics lead

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

RHM Presentation. Maas 360 Mobile device management

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

VMware Hybrid Cloud Solution

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

HiveManager Local Cloud

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

ARUBA CLEARPASS POLICY MANAGER

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Enterprise Guest Access

The Context Aware Network A Holistic Approach to BYOD

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1

Cloud Mobility: Meraki Wireless & EMM

Secure Access for Microsoft Office 365 & SaaS Applications

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

Delivering Desktop Resources to Any Device As a Service

WHITEPAPER. How to secure your Post-perimeter world

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

The Challenge. The Solution. The Modern Approach to Remote Access

PrecisionAccess Trusted Access Control

Understanding VDI End-to-End

SYMANTEC DATA CENTER SECURITY

MOBILE SECURITY, SECURE ACCESS AND BYOD AS A SERVICE. Jonas Gyllenhammar NNTF 2012

VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla. Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc.

Designing Workspace of the Future for the Mobile Worker

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

PCI DSS Compliance. White Paper Parallels Remote Application Server

SAP Security in a Hybrid World. Kiran Kola

Next Generation Infrastructure Outsourcing. Copyright 2016 Tech Mahindra. All rights reserved.

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

Citrix Workspace. Lausanne Laurent Strauss Christophe Beaugrand

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Intelligent Edge Protection

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Cisco Secure Access Control

HiveManager Public Cloud

Mobile Security using IBM Endpoint Manager Mobile Device Management

Google Identity Services for work

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

A comprehensive security solution for enhanced mobility and productivity

Borderless Networks. Tom Schepers, Director Systems Engineering

2012 Cisco and/or its affiliates. All rights reserved. 1

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

ARUBA CLEARPASS POLICY MANAGER

Unified Secure Access Beyond VPN

Pulse Connect Secure

Qualys Cloud Platform

Secure Mobility. Klaus Lenssen Senior Business Development Manager Security

CAN MICROSOFT HELP MEET THE GDPR

ADC im Cloud - Zeitalter

MD-101: Modern Desktop Administrator Part 2

Simplifying the Branch Network

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

MObile. end. complexity

ANIKET DAPTARI & RANJINI RAJENDRAN CONTRAIL TEAM

Enterprise & Cloud Security

Best Practices in Securing a Multicloud World

Demystifying NAC. Network Visibility, Access Compliance and Threat Response

Secure & Unified Identity

Simplify, Strengthen and Unify your security.

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

Partner Webinar. AnyConnect 4.0. Rene Straube Cisco Germany. December 2014

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

Transforming Security Part 2: From the Device to the Data Center

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

ForeScout Extended Module for VMware AirWatch MDM

App Gateway Deployment Guide

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH

Phil Schwan Technical

Network Access Control

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service

Beyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Cloud Customer Architecture for Securing Workloads on Cloud Services

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

ArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young

Google on BeyondCorp: Empowering employees with security for the cloud era

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Distribuire risorse desktop

Transcription:

Introducing Secure Access for the Next Generation Bram De Blander Sales Engineer bdeblander@pulsesecure.net

What CIOs are asking Mobility Cloud Apps IoT Is our firewall security and EMM system good enough? How do we secure the cloud like the data center? How do we boost worker productivity? What s on our corporate network? A common policy framework to eliminate security gaps User identity and device identity for uniform security policies Mobile apps, BYOD and SSO for happy and productive users Centralized visibility with multivendor enforcement for complete control

O U R M I S S I O N Delivering secure access solutions for people, devices, things and services

Security is about access not control Great UX Mobile Enabled Cloud Enabled

O U R S E C U R E A C C E S S S T O R Y Extend your Secure Access solution for the datacenter, to mobile devices, and Office 365, Salesforce and Box.

Dialing Up IT Transformation BYOD is here for 85% Cloud is an option for 55% IOT is coming for 40% IDG Research Services Gartner Gartner 6

What is the Focus Technology Overlapping VPN (SSL/IPSec) Loadbalancing Server/Virtualization Secure/User/Device Access Operating System MDM-solutions FW-solutions

Off-premise The need Managed Devices Corporate Data Connected Trucks IoT Tablets & Smart Phones Internet Café Remote Users Partners Corporate Data Customers Visitors WiFi Users Climate Control IoT Unmanaged Devices Conference Rooms Office Users On-premise

Old World: PC and Datacenter V S New World: Hybrid IT Off-premise Anywhere Remote Access Secure Access

The New Reality/Challenges All Major OSs Mobility On-the-go Home network Untrusted LAN Guest Wifi Cloud Security Datacenter Consolidation Ent Web GW Mobile GW VPN GW VDI GW NAC Mobile Apps Apps Cloud SaaS Apps Hybrid IT, Cloudification Datacenter Enterprise applications VDI, terminal services Cloud IaaS AWS, Azure

Pulse Secure - Secure Access Unified Client Unified client for VPN and NAC Unified policy and enforcement Endpoint compliance Off premise: Employees, Contractors, and Partners Pulse One and Pulse Workspace BYOD Ready PSA PSA Onboarding Guest Management On-premise & Off-premise User Endpoints Pulse Connect Secure Federation Services Protected Resources Pulse Policy Secure Pulse Secure Ecosystem (MDM, SIEM, IPS, etc.) On premise: Employees and Guests Turnkey Profiler Firewall Integration MDM/IAM Integration Cloud Secure User Endpoints Unmanaged Endpoints (Phones, Printers, etc.) Switches and WLAN Firewall (optional L4-L7)

Seamless Cloud Access Remote & On-Premise Benefits Leverage existing PCS infrastructure Guarantee same compliance based access SaaS SAML Metadata exchange P ULS E CONNE CT S E CURE Session Federation Cloud Secure AD P ULS E CLI E NT Authentication & Device Compliance P ULS E P OLICY S E CURE On-Premise Users

G e n e r a l D a t a P r o t e c t i o n R e g u l a t i o n Pulse Secure s solutions help companies navigate GDPR regulations with secure access simplicity

Are organizations ready for EU GDPR? On the go In the field At work How to protect employee privacy? Who has access to sensitive customer information? How to secure access to sensitive information based on employee role?

With GDPR, Mobile Security is NOT a choice!

Generation Mobile is not a Myth Today s employees ARE using personal devices to connect to the corporate network Today s employees will only make secure BYOD policies a success if they are easy to use

Top Three Reasons Simple to deploy and use Secures corporate applications and data on personal devices Protects employee privacy Customers buy and love Pulse Workspace

With GDPR, Network Access Policies are NOT a choice!

Myths About NAC Don t always believe what you hear No need for granular access policies associated with NAC solutions I am a SMB enterprise, NAC is only necessary for Large enterprises Internet of Things (IoT) challenge? Not in my company

Top Three Reasons Customers buy and love Pulse Policy Secure Proven scalable enforcement, not just visibility Smooth roaming from remote to local network Unified Client

Secure Access helps organizations enforce GDPR compliance Pulse Cloud Secure SSO and access control Pulse Connect Secure Remote Access Mobile Access Pulse Policy Secure Policy Control Network Access Pulse Workspace Asset on-boarding and protection BYOD Enablement Pulse One Management Data Analytics Pulse Secure Appliance Scalable Secure platform

I n t r o d u c i n g Pulse Access Suite

Pulse Access Suite Three solution editions E S S E N T I A L S A D V A N C E D E N T E R P R I S E Physical and virtual platforms Platform options for scale P L A T F O R M O P T I O N S P L A T F O R M S

W H Y T H E A C C E S S S U I T E? Advanced Edition Powers IT initiatives

Box IoT VPN Onboarding EMM Mobile Posture Assessment Enforcement Cloud Salesforce Device Discovery MAM Multifactor Auth Identity and Access Management SSL VDI Apps Compliance Thin App Mobile Gateway Provisioning Certs Guest Access HTML5 Cloud Migration Office365 Captive Portal Secure Browser Passwords Mobile Security MDM Self-Service BYOD

Secure Sign-on SAML based SSO with device compliance checking Enable Cloud Services Cloud Secure capabilities extend data center security to Office 365, Box and other cloud services No Passwords Strong auth that s easy for the user and secure for the enterprise Device Compliance Ensure device compliance before laptops and mobile devices access information in the cloud

Workspace Use its core EMM functionality for BYOD and mobile app security or leverage an existing solution Mobilize Data Center Apps The Secure Access Suite simplifies and secures mobile access to the data center On-demand Per-App VPN Support any use case with a best-inclass Layer 3, Layer 4 VPN that includes industry-leading rewriting capabilities Device Compliance Ensure device compliance with broad endpoint OS support, host checking, and the ability to create complex remediation and enforcement rules for laptops and mobile devices

How the Advanced Edition Works 4 Application Traffic 1 PULSE CLIENT + WORKSPACE PULSE ONE 2 3 Endpoints with SSO, certificate authentication & host checking Policy and compliance information Federation with service providers for delegated authentication Normal traffic for data center apps cloud services use tunnel for SSO and authorization only PULSE CO NNECT SECURE AD Data Center

W H Y T H E A C C E S S S U I T E? Enterprise Edition Boosts network security

Box IoT VPN Onboarding EMM Mobile Posture Assessment Enforcement Cloud Salesforce Device Discovery MAM Multifactor Auth Identity and Access Management SSL VDI Apps Compliance Thin App Mobile Gateway Provisioning Certs Guest Access HTML5 Cloud Migration Office365 Captive Portal Secure Browser Passwords Mobile Security MDM Self-Service BYOD

Visibility with Compliance Enforcement A dashboard view of what s on your network with multivendor policy enforcement Continual Assessment Discover and monitor what s on your network with Profiler for dashboard visibility and reporting. Contextual Access Use user identity and device identity to control access of the corporate network and IT resources. Multivendor Enforcement Share contextual information with thirdparty security enforcement points including firewalls, switches and wireless LAN controllers.

Secure Productivity Guest Access Give contractors, partners and guests secure access via a self-service portal and out-of-the box wizards and configurations for admins. Secure contractors, partners and guests while giving employees anywhere access to the cloud Cloud Access Give employees campus access to Office 365, Box, Salesforce and other cloud services.

How The Enterprise Edition Works 3 Guest Access Profiling + Policy Secure SaaS Guests Firewall Protected Resources Connect Secure Switch 2 Federation for Cloud Access Pulse Client (Employees) Wireless LAN 4 Multivendor Enforcement Inside network 1 Unified Client

W H Y T H E A C C E S S S U I T E? Simplifies planning & budgeting

Software Suite Easy as 1-2-3 Appliance Platform Service Options

Pick the Right Suite for You Essentials Advanced Enterprise Data Center + Mobile, Cloud Access and Visibility + Device and Network Security

Select Your Appliance Pulse Secure Appliance Small Office Branch Office Mission Critical Data Center Virtual Appliance VMware KVM Hyper-V

Tailor Your Support Software Services Gold Platinum Hardware Services Same Day Same Day with Onsite Tech Next Day Next Day with Onsite Tech

Pulse Access Suite

Mapping Product/Services to Solutions Product / Service Essentials Advanced Enterprise Pulse Connect Secure Pulse One (Cloud) Express Pulse Connect Secure Add-Ons: Device Onboarding Pulse Cloud Secure and Pulse Workspace Secure Mobile Browser NEW Pulse Profiler Pulse Policy Secure Software Support Included (Gold or Platinum)

Pulse Access Suite SaaS PulseOne MAM On-Prem Policy Secure w/ Profiling Firewall Pulse Workspace Switch Wireless LAN Protected Resources Connect Secure Pulse Client Pulse Client (Employees) Guests Unprotected Resources Essentials Edition Advanced Edition Enterprise Edition