{"id":5161,"date":"2020-03-05T14:03:59","date_gmt":"2020-03-05T13:03:59","guid":{"rendered":"https:\/\/relnet.hu\/?p=5161"},"modified":"2020-03-05T15:21:01","modified_gmt":"2020-03-05T14:21:01","slug":"secure-access-in-a-zero-trust-world-with-the-pulse-secure","status":"publish","type":"post","link":"https:\/\/relnet.hu\/en\/secure-access-in-a-zero-trust-world-with-the-pulse-secure\/","title":{"rendered":"Secure Access in a Zero-Trust World with the Pulse Secure"},"content":{"rendered":"<p>Businesses and users (employees, contractors, partners and customers) need ubiquitous secure access to data center and cloud-based applications and resources, both from inside the corporate network as well as from outside.<br \/>\n<br \/>Software-defined Perimeter (SDP) architectures offer a compelling, \u201czero trust\u201d model that can be applied to new and existing hybrid IT deployments across industries as diverse as healthcare, manufacturing, or financial services.<\/p>\n<p>Learn how from the Pulse SDP white paper:<br \/>\n<br \/>\u2022\tSDP prescribes an \u201cauthenticate and verify first\u201d approach before granting direct, protected access to applications and resources \u2013 access that does not depend on network architecture and adds significant security enhancements.<br \/>\n<br \/>\u2022\tApplication access can be restricted individually \u2013 to both applications and users.<br \/>\n<br \/>\u2022\tResources can be rendered invisible or inaccessible to all users and devices until an explicit authentication, compliance check, and authorization have been completed, offering better security and protection.<br \/>\n<br \/>\u2022\tThe overall result is a \u201cdark cloud\u201d where the attack surface of the network is diminished because hackers can\u2019t attack what they can\u2019t see.<\/p>\n<p>Pulse Secure provides easy, comprehensive software-driven Secure Access solutions for people, devices, things and services that improve visibility, protection and productivity for our customers. Pulse\\&#8217;s suites uniquely integrate cloud, mobile, application and network access to enable hybrid IT in a Zero Trust world. Over 23,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.<\/p>\n<span class=\"highlight highlight-\" ><a href=\"https:\/\/www.pulsesecure.net\/resource\/pulse-secure-software-defined-perimeter\/\">Download the white paper<\/a><\/span>\n\n<p>Source: <a href=\"https:\/\/www.pulsesecure.net\/products\/sdp-overview\/\">https:\/\/www.pulsesecure.net\/products\/sdp-overview\/<\/a><br \/>justify<br \/>no-repeat;left top;;<br \/>auto<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s world of multi-cloud customer environments, a secure access approach that is based purely on a network perimeter security model no longer suffices.<\/p>\n","protected":false},"author":1086,"featured_media":5159,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[560,559,339,338],"tags":[235,440,320,1416,432,433],"yst_prominent_words":[],"class_list":["post-5161","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-network","category-it-security","category-pulse-secure-en","category-vendor","tag-pulse-secure-en","tag-sdp-en","tag-biztonsagos-hozzaferes-en","tag-software-defined-perimeter-en","tag-zero-trust-en","tag-zero-trust-secure-access-en"],"_links":{"self":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts\/5161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/users\/1086"}],"replies":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/comments?post=5161"}],"version-history":[{"count":0,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/posts\/5161\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media\/5159"}],"wp:attachment":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media?parent=5161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/categories?post=5161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tags?post=5161"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/yst_prominent_words?post=5161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}