{"id":9464,"date":"2020-08-04T10:59:43","date_gmt":"2020-08-04T06:59:43","guid":{"rendered":"https:\/\/techxmedia.com\/?p=9464"},"modified":"2025-04-17T23:56:13","modified_gmt":"2025-04-17T19:56:13","slug":"pulse-secure-launches-new-zero-trust-service-multi-cloud-secure-access","status":"publish","type":"post","link":"https:\/\/techxmedia.com\/en\/pulse-secure-launches-new-zero-trust-service-multi-cloud-secure-access\/","title":{"rendered":"Pulse Secure launches new zero trust service for multi-cloud secure access"},"content":{"rendered":"\n<p>Pulse Secure announced the launch of Pulse Zero Trust Access (PZTA), a cloud-based, multi-tenant secure access service that enables organizations to provide users easy, anywhere access to multi-cloud and data center applications with Zero Trust assurance.<\/p>\n\n\n\n<p>PZTA simplifies access management with single-pane-of-glass visibility, end-to-end analytics, granular policies, automated provisioning, and advanced threat mitigation that empowers organizations to further optimize their increasingly mobile workforce and hybrid IT resources.<\/p>\n\n\n\n<p>PZTA offers users streamlined application access while allowing organizations to govern every request by automatically verifying identity, device, and security posture before granting a direct, encrypted connection between that user&#8217;s device and applications residing in public clouds, private clouds or data centers.<\/p>\n\n\n\n<p>\u201cIT leaders are driving business transformation in the hybrid digital era while also defending assets during the \u2018age of hyper-converged access\u2019 \u2013 for any user, from any device, anywhere to any application, at any time. Pulse Zero Trust Access is designed for the elastic digital workplace, providing a unified, cloud-based service that enables greater accessibility, efficiency, and risk reduction,\u201d said Rohini Kasturi, chief product officer at Pulse Secure. \u201cFrom inception, Pulse Secure has focused on providing secure access solutions that enhance productivity, visibility, and compliance as companies migrate to the cloud and take advantage of utility computing. PZTA exemplifies our on-going commitment to innovate while maximizing deployment flexibility, scale, interoperability, and investment protection for companies of all sizes.\u201d<\/p>\n\n\n\n<p>PZTA is based on Pulse Secure\u2019s new cloud-native, microservices-based, multi-tenant platform deployed globally in Microsoft Azure Cloud. The PZTA service consists of the Pulse ZTA Controller, which is hosted and managed by Pulse Secure, the virtual Pulse ZTA Gateway that customers deploy on-premises or in the cloud, and the unified Pulse ZTA Client which runs natively on each user\u2019s Microsoft Windows, Apple macOS and iOS, and Google Android device.<\/p>\n\n\n\n<p><strong>Architecture, Performance, Data Privacy and Adaptive Control Advantages<\/strong><\/p>\n\n\n\n<p>According to the Gartner <a href=\"https:\/\/techxmedia.com\/tag\/ztna\/\">Zero Trust Network Access<\/a> (ZTNA) market guide:* \u201cZTNA improves the flexibility, agility, and scalability of application access, enabling digital businesses to thrive without exposing internal applications directly to the internet, reducing the risk of attack.\u201d<\/p>\n\n\n\n<p>Pulse Zero Trust Access aligns with the Software-Defined Perimeter (SDP) architecture of the <a href=\"https:\/\/techxmedia.com\/tag\/cloud-security\/\">Cloud Security <\/a>Alliance, incorporating extensive identity and device authentication, separate control and data planes, centralized granular policy management, and micro-segmentation to thwart unauthorized access and attack propagation.<\/p>\n\n\n\n<p>While every user device access requires explicit authentication and authorization by the Pulse Zero Trust Access service, the Pulse ZTA Gateways are deployed in the customer\u2019s on-premise and cloud environment closest to the application or resource. This proximity optimizes user experience, reduces latency, and enables hybrid IT deployment at scale. Since encrypted application traffic only flows between the ZTA Clients and ZTA Gateways, customers gain full data privacy and data sovereignty.<\/p>\n\n\n\n<p>PZTA governs each access request and session via a centrally deployed and managed policy. Building upon Gartner\u2019s Continuous Adaptive Risk and Trust Assessment (CARTA) framework, PZTA augments contextual and identity-centric policies with built-in User and Entity Behavior Analytics (UEBA) whereby attributes for every session are monitored and assessed, applying proprietary risk-scoring algorithms to identify non-compliant, malicious and anomalous activity, and take expedited threat mitigation actions.<\/p>\n\n\n\n<p>\u201cOur customers trust us to identify and deliver advanced solutions that enable their digital business and protect their valuable resources. &nbsp;Pulse Secure has been our key partner for many years as they offer one of the most versatile, integrated, and scalable secure access solutions in the market.&nbsp;We jumped at the opportunity to test out their new Zero Trust Access cloud-based service and our teams&nbsp;have been impressed with its simplicity, manageability, and overall feature-set, said Herve Rousseau, the chief executive officer at Openminded.&nbsp;\u201cPulse Zero Trust Access service does indeed offer users an easier means to access network and cloud applications while providing organizations greater hybrid IT access agility, oversight, and management.\u201d<\/p>\n\n\n\n<p>\u201cPulse Secure has been a valuable partner that continues to provide solutions that meet our client\u2019s evolving needs. Their latest offering, Pulse Zero Trust Access, delivers an end-to-end, secure access solution with the simplicity, flexibility, and scale crucial for managing risk in a modern enterprise. We\u2019re excited to bring this compelling, cloud-based service to our&nbsp;clients,\u201d said Ron Frederick, senior director, enterprise security solutions&nbsp;of Kudelski Security.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"460\" src=\"https:\/\/techxmedia.com\/wp-content\/uploads\/2020\/08\/pulse-secure.jpg\" alt=\"pulse secure - Techxmedia\" class=\"wp-image-9467\" srcset=\"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2020\/08\/pulse-secure.jpg 800w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2020\/08\/pulse-secure-300x173.jpg 300w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2020\/08\/pulse-secure-768x442.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p><strong>Comprehensive Cloud-native, Secure Access Solution for Existing and New Customers<\/strong><\/p>\n\n\n\n<p>PZTA can co-exist with Pulse Secure\u2019s remote, mobile, and network access solution portfolio including the <a href=\"https:\/\/www.pulsesecure.net\/products\/pulse-access-suite-plus\/\">Pulse Access Suite<\/a>. Leveraging the unified, multi-tunnel Pulse ZTA Client, users can enjoy transparent, uninterrupted, and simultaneous access to applications and resources from their device of choice regardless of access method \u2013 SDP, VPN, or NAC. Organizations gain implementation and operational efficiencies, investment protection, and tool consolidation to realize a lower overall cost of ownership.<\/p>\n\n\n\n<p><strong>Additional features of PZTA include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Extensive identity, endpoint, and security posture authentication prior and during each access transaction to negate unauthorized user and vulnerable device access<\/li><li>Broad application support, including <a href=\"https:\/\/techxmedia.com\/tag\/http\/\">HTTP<\/a>, TCP\/UDP based applications, <a href=\"https:\/\/techxmedia.com\/tag\/mfa\/\">multi-factor authentication <\/a>(MFA), single sign-on (SSO) and protected connectivity options<\/li><li>User and device resource shielding prior to PZTA Controller authorization, establishing a Dark Cloud defense to eliminate target visibility for attackers and malware propagation<\/li><li>End-to-end analytics to expedite alerting, reporting, auditing, issue triage, and investigation processes<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>PZTA simplifies access management with single-pane-of-glass visibility, end-to-end analytics, granular policies, automated provisioning, and advanced threat mitigation that empowers organizations to further optimize their increasingly mobile workforce and hybrid IT resources.<\/p>\n","protected":false},"author":8,"featured_media":9466,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9685],"tags":[2041,2257,963,2613,2612,2408],"contributor":[],"class_list":["post-9464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-middle-east","tag-cloud-security","tag-http","tag-mfa","tag-sdp","tag-ueba","tag-ztna"],"featured_image_src":"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2020\/08\/Rohini-Kasturi.jpg","author_info":{"display_name":"News Desk","author_link":"https:\/\/techxmedia.com\/en\/author\/rabab\/"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/9464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/comments?post=9464"}],"version-history":[{"count":0,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/9464\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media\/9466"}],"wp:attachment":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media?parent=9464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/categories?post=9464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/tags?post=9464"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/contributor?post=9464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}