
Pulse Secure Blog
1,000 FOLLOWERS
Pulse Secure, LLC is a leading provider of access and mobile security solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilize the company's Pulse virtual private network, network access control and mobile security products to enable workers mobility securely and seamlessly in their organizations. Pulse Secures mission is to deliver..
Pulse Secure Blog
1y ago
As part of our ongoing commitment to deliver and maintain secure products, Ivanti is investing significant resources to ensure that all our solutions, including the Pulse Connect Secure (PCS) device, continue to meet our high standards. This week, Ivanti released PCS version 9.1R12, which includes enhanced features such as the incorporation of our Pulse Security Integrity Checker Tool directly into the product to create a seamless, more secure customer experience. This built-in fe ..read more
Pulse Secure Blog
2y ago
Today, the Pulse Secure team released a security update to address the issue outlined in Security Advisory SA44784 (CVE-2021-22893) impacting Pulse Connect Secure appliance. We recommend that customers move quickly to apply the update to ensure they are protected.
The Pulse Secure team has worked closely with the Cybersecurity and Infrastructure Security Agency (CISA) as well as leading forensic experts and industry groups, including Mandiant/FireEye and Stroz Friedberg, among others, to investigate and respond quickly to malicious activity that was identified on a very limited number of custo ..read more
Pulse Secure Blog
2y ago
The Pulse Secure team recently discovered that a limited number of customers have experienced evidence of exploit behavior on their Pulse Connect Secure (PCS) appliances. We are sharing information about the investigation and our actions through several communications channels in the best interests of our customers and the greater security community.
The team has been working proactively with leading forensic experts and industry groups, including Mandiant/FireEye, CISA and Stroz Friedberg, among others, to investigate and respond to the exploit behavior.
We have discovered four issues, the b ..read more
Pulse Secure Blog
2y ago
Before we discuss remote access for Office 365 for the Department of Defense, it’s important to look at how remote access has shifted this last year and the security challenges surrounding remote workforces. Earlier this year, we worked with Cybersecurity Insiders on the 2020 Remote Work From Home Cybersecurity Report, surveying more than 400 cyber security decision makers on how their enterprises are responding to accelerated WFH adoption during the COVID-19 pandemic, key challenges, concerns, strategies, and anticipated outcomes. Accelerated work from home initiatives have increased securit ..read more
Pulse Secure Blog
2y ago
As remote work becomes a “new normal” and organizations are increasingly adopting a hybrid IT architecture, they are looking at how they can accelerate Zero Trust security and simplify secure business application access for their remote users. While they are looking at new ways to address these new requirements and expanding their cloud footprint, they are also looking at protecting their existing technology investments. So, the question is, “how can they seamlessly and efficiently accelerate their move to a hybrid IT architecture for simple and secure application access from anywhere?”
With ..read more
Pulse Secure Blog
2y ago
In less than one year, the world has witnessed the effects of a global pandemic and had to rapidly adapt. Redefined business processes, shifts in mobile workforces, and changes in consumer behaviors have created a new remote world norm. Less than a quarter of employees worked from home in late 2019 but that number surged to over 75% by May of 2020. During this time, the single, most important priority was enabling millions of employees to work from home and continue their job functions without disruption. IT teams were given the task of a decade and had to successfully execute within a matter ..read more
Pulse Secure Blog
2y ago
Pulse Secure has achieved a significant milestone!
I am pleased to announce that Pulse Secure has signed a definitive agreement to be acquired by Ivanti, a leading provider of enterprise-grade, intelligent IT management and security software solutions. Ivanti is backed by affiliates of Clearlake and TA Associates, two leading private equity firms with strong IT management and software expertise.
Pulse Secure will operate as an independent unit of Ivanti and will continue to execute – and accelerate – our Secure Access mission.
I am grateful to our employees, customers, partners, and investors ..read more
Pulse Secure Blog
2y ago
As this year comes to an end, it’s important for businesses to evaluate the impact COVID-19 has had on secure remote access, the shift to mobile workforces, and business continuity strategies. There is now a global understanding that nature, like the amorphous perimeter that networks operate in today, has no bounds and at any given moment, anything can happen. Organizations of all sizes, spanning across all industries, were suddenly presented with new challenges overnight and security teams had to rapidly deploy remote access solutions that would lend their business continuity plans a fightin ..read more
Pulse Secure Blog
2y ago
Cyber Security Hub’s Editor-in-Chief Seth Adler took some time to speak with Mike Riemer, Global Chief Security Architect, Pulse Secure, and Tom Mustac, Senior Director Biomedical Cybersecurity at Mount Sinai Health System, around key lessons and takeaways from the last few months of conducting operations during a global pandemic.
“We weren’t prepared.”
“We never saw this coming.”
These sentiments have undoubtedly been repeated across all verticals and industries as businesses and organizations were hard-pressed to rapidly scale out their footprint, bringing complexity—and in some cases incre ..read more
Pulse Secure Blog
2y ago
I recently had the pleasure to sit down with Pulse Secure CEO, Sudhakar Ramakrishna to discuss the current trends and key practices around achieving secure access, remote productivity, and moving to a Zero Trust model.
Beginning back in March, organizations around the globe were faced with the unprecedented task of ramping up their resources to securely connect and navigate a continuously increasing threat landscape and evolving perimeter as work-from-home mandates ushered in a “new normal.”
With remote access undergoing a historic surge in use and application, organizations have learned that ..read more