#cybersecurity | hacker | First look: Pulse Secure Software Defined Perimeter

#cybersecurity | hacker | First look: Pulse Secure Software Defined Perimeter


At a GlanceProduct: Pulse Software Defined Perimeter (SDP)Vendor: Pulse SecurePrice: $66 per user, based on 1,000-user purchase.


What it does: Uses policies to apply granular application access rights based on the unique combination of a user profile and device type.What we liked: Flexibility and ease of deployment.The Bottom Line: The “zero trust” framework provides a very scalable an effective approach to securing applications.


As traditional networkdefenses have evolved, malicious players have shifted focus from infrastructureattacks to targeted software attacks. Whether the motivation is to obtaincritical data or to simply disrupt operations, applications are now theprevailing target of opportunity, leaving many organizations unprepared andunprotected. The ease of access offered by web applications is a blessing forusers but a curse for security teams as it adds a whole new dimension to thechallenge of effectively securing applications.


Understanding suchcomplexities, Pulse Secure has addressed the challenge head on with theSoftware Defined Perimeter (SDP) solution. This innovative platform offersusers secured access to applications regardless of application location, userlocation or device.


The solution leverages theuniversal pulse client (agent), which supports multiple platforms. A clientless(agentless) version also is available for a defined set of applications. TheSDP architecture is based on two primary components that include a controllerand gateway. The gateway exists to transfer data between the data center andthe cloud while the controller takes administrator policies and distributesthem to the gateway. A standard deployment requires at least three differentdevices – a Pulse One appliance, an SDP Controller appliance and an SDP Gatewayappliance –  but additional SDP gatewaysmay be necessary depending upon network and deployment requirements.


The whole premise of theplatform is that an application requires establishing trust before a deviceconnection is granted. Without a trust verification, the device is blocked fromaccessing an application. This approach is effect ..

Support the originator by clicking the read the rest link below.