Implementing Secure Access & Mobile Identity

Post on 15-Apr-2017

39 views 0 download

Transcript of Implementing Secure Access & Mobile Identity

EUROPE CELEBRATING 20 YEARS

02-04 JUNE15O L Y M P I A L O N D O N U K

®

Implementing Secure Access & Mobile Identity

Jeff Green, SVP of Product Development

®

EUROPE CELEBRATING 20 YEARS

02-04 JUNE15O L Y M P I A L O N D O N U K

Implementing Secure Access & Mobile Identity Jeff Green | SVP of Product Development | Pulse Secure

3

Ingredients for enterprise transformation

48% of CIOs surveyed by Gartner report that Mobile is the rule not the exception

55% of surveyed CIOs view Cloud as a deployment option

Contextual apps purpose-built for the device boost worker productivity

4

Mobile Endpoints Shadow IT - Cloud Services

An Auth-n, Compliance & Control nightmare

5

Fundamentals for Secure Access & Identity

Simplify access for the user through SSO and Password-lessUser Experience

Understand who and what is connecting to your network/applicationsVisibility

Check devices for compliance to security policiesCompliance

Understand authorized devices, users & locationAuthorization & Identity

Create access policy for users, devices and locationsAccess Policy

Any App, Any Device, Anywhere

6

Policy, Compliance, Access Control

Datacenter

PS Connect Secure

Pulse Client

VPN Access to the data center is

foundational

Control Cloud & Mobile Access/Identity now

Use VPN/IDP gateway to hairpin access, compliance and identity •  Restricted IP •  Internal IDP and DNS

7

Public Cloud

Access Policy & Compliance is controlled whether through

VPN or Direct to cloud

Policy and Compliance

Datacenter

Private Cloud

Pulse Data Membrane™ Technology

Pulse One Management

Pulse Workspace

Mobile access control & data-at-rest security

PS Connect Secure

8

Compliance

Authorization & Identity

Secure Data in transit and compliance with

Pulse Connect Secure Pulse Policy Secure Pulse Secure Profiler

Visibility

Access Policy

Create and manage access policy with Pulse One

Containerize and secure data at rest with Pulse Workspace

User Experience

Access Policy

Solve the Identity & Secure Access dilemma

9

Visit Pulse Secures’ stand for demo’s of Pulse One & Pulse Workspace Stand #F280

Thank You