Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/8/2017
03:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Pulse Secure Offers Buy-1-Get-1-free on Next-Gen Hardware & Virtual Appliances

Pulse Secure promotion helps organizations rapidly move from outdated Remote Access to Secure Access for the data center and cloud

SAN JOSE, CA--(November, 8, 2017) - Pulse Secure, a leading provider of secure access solutions to both enterprises and service providers,  has announced a new promotion to help enterprises deploy mobile and cloud services with it latest Secure Access appliances and software suite. The “Secure the Future” promotion which runs until the 31st of December 2017 offers a free PSA5000 or PSA7000 appliance when purchased with the Pulse Access Suite software, maintenance and support contracts.

The Pulse Secure Appliance (PSA) series offers best in class physical, virtual and cloud appliances purpose-built for Pulse Connect Secure (SSL VPN), Pulse Policy Secure (NAC), Pulse Workspace (secure mobile workspaces) and Pulse One's centralized management and end-to-end visibility platform. With a software defined configuration, the PSA5000 and PSA7000 appliances scale from 2,500 to 25,000 SSL connections or 10,000 to 50,000 NAC endpoints.

The Pulse Access Suite contains all the software and services needed to deliver Secure Access, with the Advanced and Enterprise suite editions extending VPN capabilities to include cloud security with compliance enforcement and NAC features for device discovery and profiling plus Layer 2 and Layer 3 access policies.

In addition, the promotion can be extended to provide flexible deployment options such as license server software and In Case of Emergency (ICE) licenses.  The promotion also includes deployment of Pulse Secure Virtual Appliances within IaaS providers such as Microsoft Azure.

The terms and conditions for the promotion requires the purchase of a minimum of 250 Pulse Access Suite licenses for the PSA 5000 or 1000 licenses for the PSA 7000 along with 3 years of next day hardware services for each physical appliance plus 3 years of Platinum Suite services for perpetual software licenses, or the equivalent subscription period for virtual appliances and their software.

“This promotion offers a practical way for our partners to help customers extend Secure Access for the data center now to the cloud using our latest generation of hardware, software and virtual solutions in a cost effective manner,” says Dan Dearing, Senior Director of Product Marketing for Pulse Secure, “By extending the promotion to encompass a Hybrid IT solution of physical, virtual and cloud appliances, we help to secure the evolving data center and simplify the deployment process for all of our customers, existing or new.”

More information and full terms and conditions are available at https://www.pulsesecure.net/lp/securethefuture/

About Pulse Secure

Pulse Secure, LLC is a leading provider of secure access solutions to both enterprises and service providers.  Enterprises from every vertical and of all sizes utilize the company’s virtual private network (VPN), network access control (NAC), virtual application delivery controller (vADC) and mobile security products to enable end-user mobility securely and seamlessly in their organizations. Pulse Secure was formed in 2014 from Juniper Networks’ Junos Pulse business.  Pulse Secure’s mission is to deliver secure access solutions for people, devices, things, and services. www.pulsesecure.net

Follow us at @PulseSecure on Twitter or visit us on LinkedIn and Facebook.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29070
PUBLISHED: 2020-11-25
osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
CVE-2020-26212
PUBLISHED: 2020-11-25
GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of ever...
CVE-2020-26243
PUBLISHED: 2020-11-25
Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded...
CVE-2020-25650
PUBLISHED: 2020-11-25
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service fo...
CVE-2020-29071
PUBLISHED: 2020-11-25
An XSS issue was found in the Shares feature of LiquidFiles before 3.3.19. The issue arises from the insecure rendering of HTML files uploaded to the platform as attachments, when the -htmlview URL is directly accessed. The impact ranges from executing commands as root on the server to retrieving se...