On the Radar: Pulse Secure
|
|
|
- Caitlin Francis
- 9 years ago
- Views:
Transcription
1 Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT Rik Turner
2 Summary Catalyst Pulse Secure is a developer of secure access technology for both corporate-owned and bring your own device (BYOD) endpoints. It relies on client software for the former and containerization for the latter, with plans to move its back-end server functionality into the cloud to offer secure access management as a service. It is not a start-up, having been spun out of Juniper Networks as a mature business. It is, however, a new name in the access management and endpoint security space. Key messages Pulse is the virtual private network (VPN) and network access control (NAC) business spun out of Juniper. It added BYOD security by acquiring MobileSpaces, which brought it containerization technology. Pulse is working on integration with the leading security incident and event management (SIEM) platforms, the first of which will be IBM QRadar. It is moving its back end into the cloud, offering it as a service from Microsoft Azure later this year. Ovum view Pulse will be a significant player in secure access management as that market evolves beyond laptops and remote desktops to support smartphones and tablets, with BYOD further complicating matters. Its challenge will be to stand out from the crowd with the breadth of its portfolio. Recommendations for enterprises Why put Pulse Secure on your radar? Pulse Secure has proven VPN and NAC technology that is used by its extensive customer base. It has added mobile containerization to address the BYOD challenge, with plans to offer its entire portfolio as cloud-based services later this year. It should be on your list of vendors to consider when choosing a secure access management platform. Highlights Pulse delivers VPN and NAC functionality via a software client downloaded to the endpoint, with support for Android, ios, and conventional laptop operating systems. When an endpoint logs onto a corporate network its technology checks whether it is compliant and imposes security policy based on its conclusion. For endpoints that do not belong to a company but are introduced into the work environment by an employee (i.e. in the BYOD scenario), MobileSpaces containerization technology enables it to separate personal and professional environments on the device and, if necessary, carry out a remote wipe of all corporate data, without affecting the user s personal information, contacts, Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 2
3 photos, and so on. It offers a single console from which companies can view their entire endpoint estate, both corporate and BYOD, called Pulse One, and is also working on integrations with SIEM platforms for customers who prefer to manage endpoint security and access from a broader, overarching console. Background Pulse Secure is the result of private equity firm Siris Capital s October 2014 acquisition of the VPN and NAC business from Juniper Networks. Pulse immediately acquired mobile endpoint security vendor MobileSpaces to add a BYOD security capability to its arsenal. As one might expect, Pulse s management team includes a number of former Juniper executives, but it is led by CEO Sudhakar Ramakrishna, who was previously senior vice-president and general manager for the Enterprise and Service Provider Division at Citrix, prior to which he held management positions at Polycom, Motorola, 3Com, and US Robotics. Current position Pulse debuted as an independent company with $100m in revenue, 20,000 enterprise customers, and some 20 million endpoints under management. It continues to leverage Juniper as a key route to market for its VPN technology. The company s roadmap features plans to offer what it terms its next-generation secure access technology as cloud-based services, with the Microsoft Azure cloud as the first target from which to launch later this year. It also plans integration with leading security incident and event management (SIEM) platforms, with IBM s QRadar scheduled for the next release of the Pulse platform. The challenge Pulse faces is not, of course, that of a start-up, in that it debuts with a major client base and a healthy run rate. Rather it is the need to differentiate itself in the crowded market for enterprise mobility management (EMM) and, more generally, for endpoint security and network access technology (see Ovum Decision Matrix: Selecting an Endpoint/Mobile Security Solution, for a selection of the leading providers in this market). The issue is liable, at least in part, to be one of market education; there is currently a confusing plethora of vendors, with some offering conventional VPN technology (e.g. F5 and Citrix), some NAC (such as ForeScout), and some EMM platforms (such as AirWatch and MobileIron). Pulse needs to inform potential new customers that it competes with all these companies, but with a broad portfolio that can also collaborate with their technologies if the customer already has one of them in its infrastructure. Data sheet Key facts Table 1: Data sheet: Pulse Secure Product name The Pulse Secure solution suite includes Pulse Connect Secure (VPN), Pulse Policy Secure (NAC), Pulse Workspace (Mobile Container), Pulse One Product classification Next-generation secure access Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 3
4 (Management) Version number Pulse Connect Secure 8.1; Release date Pulse Policy Secure 5.2; Pulse Workspace 1.3; Pulse One 1.0 Currently in general availability Industries covered All markets Geographies covered Global Relevant company sizes Small, medium, and large enterprises Licensing options Perpetual and subscription URL Routes to market Channel and direct Company headquarters San Jose, California, US Number of employees 300 Source: Ovum Appendix On the Radar On the Radar is a series of research notes about vendors bringing innovative ideas, products, or business models to their markets. Although On the Radar vendors may not be ready for prime time, they bear watching for their potential impact on markets and could be suitable for certain enterprise and public sector IT organizations. Further reading Ovum Decision Matrix: Selecting an Endpoint/Mobile Security Solution, , IT (August 2014) Author Rik Turner, Senior Analyst, Infrastructure Solutions [email protected] Ovum Consulting We hope that this analysis will help you make informed and imaginative business decisions. If you have further requirements, Ovum s consulting team may be able to help you. For more information about Ovum s consulting capabilities, please contact us directly at [email protected]. Copyright notice and disclaimer The contents of this product are protected by international copyright laws, database rights and other intellectual property rights. The owner of these rights is Informa Telecoms and Media Limited, our affiliates or other third party licensors. All product and company names and logos contained within or appearing on this product are the trademarks, service marks or trading names of their respective owners, including Informa Telecoms and Media Limited. This product may not be copied, reproduced, distributed or transmitted in any form or by any means without the prior permission of Informa Telecoms and Media Limited. Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 4
5 Whilst reasonable efforts have been made to ensure that the information and content of this product was correct as at the date of first publication, neither Informa Telecoms and Media Limited nor any person engaged or employed by Informa Telecoms and Media Limited accepts any liability for any errors, omissions or other inaccuracies. Readers should independently verify any facts and figures as no liability can be accepted in this regard readers assume full responsibility and risk accordingly for their use of such information and content. Any views and/or opinions expressed in this product by individual authors or contributors are their personal views and/or opinions and do not necessarily reflect the views and/or opinions of Informa Telecoms and Media Limited. Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 5
6 CONTACT US INTERNATIONAL OFFICES Beijing Dubai Hong Kong Hyderabad Johannesburg London Melbourne New York San Francisco Sao Paulo Tokyo Ovum. All rights reserved. Unauthorized reproduction prohibited. Page 6
On the Radar: CipherCloud
Cloud access security delivered on enterprise gateways Publication Date: 18 Feb 2015 Product code: IT0022-000305 Rik Turner Summary Catalyst CipherCloud develops cloud visibility and security technology
Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15
Ovum Decision Matrix: Selecting an Enterprise File Sync and Share Product, 2014 15 Excerpt prepared for Egnyte, Inc. Publication Date: 28 Aug 2014 Product code: IT0021-000018 Richard Edwards Summary Catalyst
On the Radar: Tamr. Applying machine learning to integrating Big Data. Publication Date: Sept. 2014 Product code: IT0014-002934.
Applying machine learning to integrating Big Data Publication Date: Sept. 2014 Product code: IT0014-002934 Tony Baer Summary Catalyst Traditional data integration approaches may not scale for Big Data.
On the Radar: ForgeRock
Identity management for B2C and the Internet of Things Publication Date: 03 Dec 2015 Product code: IT0022-000500 Rik Turner Summary Catalyst ForgeRock develops identity and access management (IAM) technology
SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio
SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett
SWOT Assessment: BMC Remedy v9
SWOT Assessment: BMC Remedy v9 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 17 Aug 2015 Product code: IT0022-000489 Adam Holtby Summary Catalyst BMC Software is an
SWOT Assessment: Alfresco, Alfresco One, v5.0
SWOT Assessment: Alfresco, Alfresco One, v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: May 5 th, 2015 Product code: IT0014-003012 Sue Clarke Summary Catalyst When
Web Application Firewalls: The TCO Question
Web Application Firewalls: The TCO Question Ovum looks into total cost of ownership for WAFs Rik Turner Summary Catalyst Ovum has carried out a series of interviews with companies in North America, Europe,
Case Study: Vitamix. Improving strategic business integration using IT service management practices and technology
Improving strategic business integration using IT service management practices and technology Publication Date: 17 Sep 2014 Product code: IT0022-000180 Adam Holtby Summary Catalyst For Vitamix, a key driver
Financial services perspectives on the role and real impact of cloud
Financial services perspectives on the role and real impact of cloud Executive Summary Ovum has recently concluded an independent and in-depth survey of 400 senior CIOs within financial services institutions
HP s revitalized workforce optimization suite is worth a fresh look
HP s revitalized workforce optimization suite is worth a fresh look Publication Date: 27 Jul 2015 Product code: IT0020-000139 Keith Dawson Ovum view Summary When contact center buyers look to acquire workforce
On the Radar: Alation harnesses crowdsourcing and machine learning to speed data access
On the Radar: Alation harnesses crowdsourcing and machine learning to speed data access Summary Catalyst As organizations widen their net and analyze more data sources, it becomes all too easy for business
Enterprise Content Management: The Suite Perspective
Enterprise Content Management: The Suite Perspective Publication Date: 04 Dec 2015 Product code: IT0014-003079 Sue Clarke Summary Catalyst The Ovum Decision Matrix: Selecting an Enterprise Content Management
Winning with Emerging CRM Channels. An Ovum White Paper
Winning with Emerging CRM Channels An Ovum White Paper Introduction If there has been one constant over the past five years, it is the shift in how consumers interact not just with each other, but how
The Future of Payments 2015: Financial Institutions. The Payments Value Chain is Driven by Customers
The Future of Payments 2015: Financial Institutions The Payments Value Chain is Driven by Customers 1 Catalyst Payments Are at a Crossroads The payments market is changing. From cash to checks, to charge
2015 Global Payments Insight: Bill Pay Services. With big change comes big opportunity
2015 Global Payments Insight: Bill Pay Services With big change comes big opportunity Catalyst Payments are at a crossroads The payments market is changing. From cash to checks, to charge and credit cards,
How To Understand The Implications Of Outsourced Testing
Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 2015 Author: Thomas Reuner Summary Catalyst The emergence of comprehensive outsourced testing of software applications, in which
Ovum Decision Matrix: Selecting an Enterprise Mobility Management Solution, 2014 15
Ovum Decision Matrix: Selecting an Enterprise Mobility Management Solution, 2014 15 Publication Date: 17 Sep 2014 Product code: IT0021-000023 Richard Absalom Summary Catalyst Organizations of all shapes
Ovum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16
Ovum Decision Matrix: Selecting a Hybrid Cloud and Virtualization Management Solution, 2015 16 Publication Date: 29 Jul 2015 Product code: IT0022-000410 Roy Illsley Summary Catalyst The role and purpose
How To Rank Customer Analytics Vendors
Ovum Decision Matrix: Selecting a Customer Analytics Solution for Telcos, 2015 16 Publication Date: 10 Sep 2015 Product code: IT0012-000135 Adaora Okeleke Summary Catalyst Telcos quest for a competitive
Data Center Automation: Market Landscape and Maturity Model
Data Center Automation: Market Landscape and Maturity Model Assessing the organizational readiness and market in data center automation Publication Date: 16 Dec 2015 Product code: IT0022-000569 Roy Illsley
CA Service Management Solutions 14.1
CA Service Management Solutions 14.1 CA Technologies Publication Date: 06 Apr 2016 Product code: IT0022-000623 Adam Holtby Summary Catalyst IT functions are subject not only to the enterprise-wide mandate
Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15
Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15 Publication Date: 06 Jan 2015 Product code: IT0019-003398 Thomas Reuner Summary Catalyst The emergence of comprehensive outsourced
SWOT Assessment: Eccentex AppBase v5.0
SWOT Assessment: Eccentex AppBase v5.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002764 Publication Date: 29 Jul 2013 Author: Sue Clarke SUMMARY Catalyst Eccentex
On the Radar: Truphone
Publication Date: 05 Sep 2013 Product code: TE007-000702 Pauline Trotter SUMMARY In a nutshell Truphone started out as a mobile VoIP player, but is mostly known as a specialist that has concentrated on
The Critical Impact of Cloud for Insurance on Business Transformation
The Critical Impact of Cloud for Insurance on Business Transformation Charles Juniper, Senior Insurance Analyst Executive summary Cloud technology and its role within the insurance industry has generated
How To Understand The Internet Of Things
www.ovum.com The Internet of Things: Understanding the evolving value chain Jamie Moss, Senior Analyst, Consumer Technology & IoT Gary Barnett, Chief Analyst, Software, Ovum Ovum s Internet of Things (IoT)
On the Case: HCL News Corp (News UK)
On the Case: HCL News Corp (News UK) HCL s feasibility assessment framework reduces cloud migration complexities Publication Date: 28 Nov 2014 Product code: IT0021-000045 Kedar Mohite Summary Catalyst
Enterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility [email protected] / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
OSS/BSS market overview and vendor landscape, 2Q13-1Q14
www.ovum.com OSS/BSS market overview and vendor landscape, 2Q13-1Q14 Market overview 2 Publicly announced OSS/BSS contracts, 2Q13 1Q14 Source: Ovum 3 The global OSS/BSS market, 2Q13 1Q14 Overall, the number
Securing BYOD With Network Access Control, a Case Study
Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device
2016 Global Payments Insight Survey: Merchants and Retailers. Changing the merchant experience
2016 Global Payments Insight Survey: Merchants and Retailers Changing the merchant experience 1 Catalyst Payment players need to rethink roles and relationships The payments industry has always been an
On the Radar: NextPlane
On the Radar: NextPlane Unified communications federation delivered via the cloud Reference Code: IT016-001534 Publication Date: 24 Sep 2013 Author: Saurabh Sharma SUMMARY Catalyst NextPlane UC Exchange
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Best Practices for Secure Mobile Access
Best Practices for Secure Mobile Access A guide to the future. Abstract Today, more people are working from more locations using more devices than ever before. Organizations are eager to reap the benefits
ImageWare Systems, Inc.
ImageWare Systems, Inc. Delivering next-generation biometrics as an interactive and scalable cloud-based service SUMMARY Catalyst ImageWare Systems, Inc. (IWS) is a developer of leading-edge, identity-based,
Secunia Corporate Software Inspector (Secunia CSI) ver.5.0
TECHNOLOGY AUDIT Secunia Corporate Software Inspector (Secunia CSI) ver.5.0 Secunia Reference Code: OI00070-107 Publication Date: December 2011 Author: Andy Kellett SUMMARY Catalyst Organizations need
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
How To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
2015 Trends to Watch: Enterprise Collaboration and Productivity
2015 Trends to Watch: Enterprise Collaboration and Productivity Adopting next-generation mobility, collaboration, and productivity tools for an empowered workforce Publication Date: 01 Dec 2014 Product
CA Performance Management Solution for Communications Service Providers
CA Performance Management Solution for Communications Service Providers CA Technologies Publication Date: 23 Mar 2015 Product code: IT0012-000102 Peter Dykes Summary Catalyst Flexible and cost-effective
SWOT Assessment: CoreMedia, CoreMedia 7
SWOT Assessment: CoreMedia, CoreMedia 7 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002848 Publication Date: 09 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Web
SWOT Assessment: FireMon Security Manager Suite v7.0
SWOT Assessment: FireMon Security Manager Suite v7.0 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT017-004174 Publication Date: 12 Aug 2013 Author: Andrew Kellett SUMMARY
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
On the Radar: Tessella
On the Radar: Tessella Creating an archive for the long-term preservation of digital content Reference Code: IT014-002789 Publication Date: 04 Sep 2013 Author: Sue Clarke SUMMARY Catalyst Ensuring that
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Securing Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
CityNext: Microsoft's Future City Market Proposition
CityNext: Microsoft's Future City Market Proposition Driving a "people-first" approach with the right technology Reference Code: IT007-000728 Publication Date: 30 Oct 2013 Author: Joe Dignan SUMMARY Catalyst
SWOT Assessment: dotcms dotcms v2.5
SWOT Assessment: dotcms dotcms v2.5 Analyzing the strengths, weaknesses, opportunities, and threats Reference Code: IT014-002855 Publication Date: 13 Dec 2013 Author: Sue Clarke SUMMARY Catalyst Traditional
The Forrester Wave : Enterprise Mobile Management, Q4 2015
The Forrester Wave : Enterprise Mobile Management, Q4 2015 by Christian Kane Why Read This Report In Forrester s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the
Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15
Ovum Decision Matrix: Selecting an Outsourced Testing Service Provider, 2014 15 Publication Date: 06 Jan 2015 Product code: IT0019-003398 Thomas Reuner Summary Catalyst The emergence of comprehensive outsourced
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
Citrix announces 50% YoY revenue growth from cloud partners, Workspace Services
Citrix announces 50% YoY revenue growth from cloud partners, Workspace Services Analyst: Scott Ottaway Michael Coté 5 Jun, 2014 At Synergy, Citrix announced 50% YoY revenue growth via Citrix Service Providers,
Case Study: Unifying ITSM Practices and Technology
Case Study: Unifying ITSM Practices and Technology SBM Offshore Reference Code: EI025-000007 Publication Date: 17 Jun 2014 Author: Adam Holtby SUMMARY Catalyst As a result of corporate expansions, mergers,
RESEARCH NOTE. Workplace Service. Hot Vendors in Video Conferencing, 2015
June 11, 2015 Author: David Mario Smith Hot Vendors in Video Conferencing, 2015 Summary: Videoconferencing is at an inflection point: emerging software-based offerings are disrupting traditional hardware
How To Be A Cloud Leader In The Telecoms World Through Cloud Success
Cloud Strategy Snapshot: T-Systems Standing out in the telecoms world through cloud success Publication Date: 01 May 2015 Product code: TE0005-000706 Adrian Ho Ovum view Summary T-Systems has long been
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Secunia Vulnerability Intelligence Manager
TECHNOLOGY AUDIT Secunia Vulnerability Intelligence Manager Secunia Reference Code: OI00070-076 Publication Date: July 2011 Author: Andy Kellett SUMMARY Catalyst Secunia Vulnerability Intelligence Manager
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
