Pulse Secure

MobileIron and Pulse Secure acquired by Ivanti

Ivanti, an IT software company that’s based in Utah, has proudly announced that it is going to acquire MobileIron and Pulse Secure for an undisclosed amount. Trade analysts say that MobileIron that’s into the business of Mobile Security could have gained anything in between $800-$900 million from the deal, while the price-point of secure access […]

Controlling Access Is a Key Component of Security for Hybrid IT

By Scott Gordon, CISSP CMO, Pulse Secure  Despite rapid growth of cloud services and SaaS apps, organizations are not giving up their data centers anytime soon. Why? Conventional on-premises deployments offer the complete control over applications, infrastructure, and resources required for business-critical and legacy applications as well as compliance with data protection regulations. “The 2019 State of […]

Pulse Secure Announces Collaboration with New Strategic Authorized Education Partners

This post was originally published here by Pulse Secure. SAN JOSE, Calif. –  April 10, 2019 – Pulse Secure, the leading provider of software-defined Secure Access solutions, today announced that it has teamed up with Dynamic Worldwide Training Consultants (DWWTC) and Westcon Americas, A Division of SYNNEX, to deliver the new Pulse Secure Authorized Training program to […]

Build Smarter, More Secure Applications with Pulse vADC Community Edition

Communities define us We are defined by the company we keep – but what do we mean by the word “community?” The word “community” used to refer to the simple idea of a group of people living in the same place. And the idea of “Communication” is about the way we share information around our […]

Zero Trust Secure Access in 2019

Today’s enterprises are increasingly under attack by threat actors bent on breaching network perimeters. Notable breaches are now almost a weekly occurrence, with Marriott’s 500M records being just the largest and latest. Estimates suggest that over 5 billion records were collectively stolen in data breaches in the first half of 2018 alone. In the Marriott […]

Gear Up Your Secure Access Strategy for 2019

Before the advent of Cloud and BYOD, enterprise network access was predominantly restricted to few limited corporate owned devices where network admins had full control and visibility into endpoints. The phenomenon of digital IT has led enterprises to embrace initiatives like Cloud and BYOD, allowing users to use personal devices for corporate network access anytime and from anywhere. This […]

Share this page