implementing secure access & mobile identity

9
CELEBRATING 20 YEARS ® Implementing Secure Access & Mobile Identity Jeff Green, SVP of Product Development

Upload: jeff-green

Post on 15-Apr-2017

41 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Implementing Secure Access & Mobile Identity

EUROPE CELEBRATING 20 YEARS

02-04 JUNE15O L Y M P I A L O N D O N U K

®

Implementing Secure Access & Mobile Identity

Jeff Green, SVP of Product Development

Page 2: Implementing Secure Access & Mobile Identity

®

EUROPE CELEBRATING 20 YEARS

02-04 JUNE15O L Y M P I A L O N D O N U K

Implementing Secure Access & Mobile Identity Jeff Green | SVP of Product Development | Pulse Secure

Page 3: Implementing Secure Access & Mobile Identity

3

Ingredients for enterprise transformation

48% of CIOs surveyed by Gartner report that Mobile is the rule not the exception

55% of surveyed CIOs view Cloud as a deployment option

Contextual apps purpose-built for the device boost worker productivity

Page 4: Implementing Secure Access & Mobile Identity

4

Mobile Endpoints Shadow IT - Cloud Services

An Auth-n, Compliance & Control nightmare

Page 5: Implementing Secure Access & Mobile Identity

5

Fundamentals for Secure Access & Identity

Simplify access for the user through SSO and Password-lessUser Experience

Understand who and what is connecting to your network/applicationsVisibility

Check devices for compliance to security policiesCompliance

Understand authorized devices, users & locationAuthorization & Identity

Create access policy for users, devices and locationsAccess Policy

Any App, Any Device, Anywhere

Page 6: Implementing Secure Access & Mobile Identity

6

Policy, Compliance, Access Control

Datacenter

PS Connect Secure

Pulse Client

VPN Access to the data center is

foundational

Control Cloud & Mobile Access/Identity now

Use VPN/IDP gateway to hairpin access, compliance and identity •  Restricted IP •  Internal IDP and DNS

Page 7: Implementing Secure Access & Mobile Identity

7

Public Cloud

Access Policy & Compliance is controlled whether through

VPN or Direct to cloud

Policy and Compliance

Datacenter

Private Cloud

Pulse Data Membrane™ Technology

Pulse One Management

Pulse Workspace

Mobile access control & data-at-rest security

PS Connect Secure

Page 8: Implementing Secure Access & Mobile Identity

8

Compliance

Authorization & Identity

Secure Data in transit and compliance with

Pulse Connect Secure Pulse Policy Secure Pulse Secure Profiler

Visibility

Access Policy

Create and manage access policy with Pulse One

Containerize and secure data at rest with Pulse Workspace

User Experience

Access Policy

Solve the Identity & Secure Access dilemma

Page 9: Implementing Secure Access & Mobile Identity

9

Visit Pulse Secures’ stand for demo’s of Pulse One & Pulse Workspace Stand #F280

Thank You