Pulse Policy Secure
A contemporary Network Access Control (NAC) solution built for the next generation of networks
Our Price: $800.00
Our Price: $5,400.00
Our Price: $13,000.00
Click here to jump to more pricing!
Overview:
As part of the Secure Access Solution from Pulse Secure, Pulse Policy Secure is a mobile-ready NAC solution that offers extensive visibility on the network activity for security and performance. After seeing what is on the network, you now have a centralized granular policy platform that integrates with market leading network vendors for enforcement. Addressing numerous industry compliance requirements from government to healthcarefinance, Policy Secure streamlines everyday mobile access challenges like BYOD and guest-access, while creating network traffic flows clean of malware infections and many other risks associated with security breaches.
Pulse Policy Secure delivers an easy-to-use BYOD ready granular access control solution that is context aware, identity enabled, location and device based for the most complex datacenter and cloud environments. Pulse Policy Secure enables safe, protected network and cloud access for a diverse user audience over a wide range of devices. The Pulse Policy Secure provides best-in-class performance and scalability while delivering centralized policy management with visibility, access control, and simplifying deployment, administration, and management.
Pulse Policy Secure provides visibility into the network by detecting and continuously monitoring the network. Pulse Policy Secure can be enabled at Layer 2 leveraging 802.1X/RADIUS; at Layer 3 using an overlay deployment; or in a mixed mode using 802.1X for network admission control and a Layer 3 overlay deployment for resource access control. It fully integrates with any vendor’s 802.1X/RADIUS;-enabled wireless access points, such as Cisco, HP/Aruba Wireless, Brocade/ Ruckus Wireless, or any vendor’s 802.1X-enabled switches, such as Juniper Networks EX Series Ethernet Switches, which, when deployed with Pulse Policy Secure, deliver additional, rich policy enforcement capabilities. Existing 802.1X infrastructure may be leveraged, as well as any Juniper, Palo Alto Networks firewall or Fortinet firewall, for policy enforcement and granular access control. Pulse Policy Secure also supports the Juniper Networks SRX Series branch firewalls, allowing them to configure Pulse Policy Secure as a RADIUS server, saving cost while addressing 802.1X support for branch offices.
Pulse Policy Secure also added support for device visibility and policy enforcement on switches using SNMP (Simple Network Management Protocol) as an alternative to 802.1X. Pulse Policy Secure uses SNMP v1/v2c/v3 to discover L2/L3 switches and discover endpoints via SNMP Traps (LinkUp, LinkDown, MAC notification, and Port security). SNMP-based policy enforcement can be applied to endpoints running the Pulse Client, and to clientless endpoints where the MAC address is discovered via SNMP. For endpoints running the Pulse Client, role assignment may be based on compliance; for clientless endpoints, role assignment is based on MAC address.
Pulse Policy with SNMP simplifies NAC deployment without using 802.1x supplicant and leverage existing network device infrastructure that may not support 802.1X feature. With SNMP enforcement, NAC is easy to deploy and achieve comprehensive compliance and rolebase access.
NAC Uncomplicated
Pulse Policy Secure makes controlling who and what connects to your network simple.
- Complete Network Visibility
Simplified auditing and monitoring of network devices enterprise wide. - Automatic Device Onboarding
Automatic onboarding features for Windows, Mac, smartphones and tablets. - Regulatory Compliance
Ensure security compliance with the most stringent industry and government regulations. - Contextual Access Control
Unified policy across wired and wireless connections, personal and corporate devices, remote and local access. - Wizards and Templates
Take the complexity out of setting up a NAC solution. - Guest User Management
Simplify the experience of handling restricted casual visitors to your network. - Mobility Management Integration
Extend NAC policy enforcement with information from 3rd party EMM solutions. - Plays nice with your network
Interoperable with existing network infrastructure such as switches, wireless controllers, AD, Firewalls, IDS and SIEM.
Visibility with Pulse Secure Profiler
Pulse Policy Secure offers an on-box profiler solution that dynamically identifies and classifies devices that are using client and clientless software. It enables access control to resources based on the type of the device. It uses different fingerprinting methods to classify devices with DHCP Fingerprinting (Helper Address or RSPAN port), SNMP/SNMP Traps, CDP/LLDP, HTTP User Agent, Nmap, WMI and MDM. Our intuitive dashboard offers a single pane of glass view for all devices on the network. Additional contextual information is available for troubleshooting and visibility purpose. Pulse Secure Profiler continuously monitors devices and re-evaluates classification based on on-going changes. Pulse Secure Profiler classifies endpoints coming from VPN or On-premise connection, so that administrators can get a complete visibility into their network.
Network Security and Application Access Control Integration
Pulse Policy Secure leverages additional network components to ensure secure context aware network and application access control, address specific use cases, and centralize network policy management. It integrates with the intrusion prevention system (IPS) capabilities of the SRX Series gateways for both data center and branch, as well as the standalone Juniper Networks IDP Series Intrusion Detection and Prevention Appliances, to deliver broad application traffic visibility—mitigating insider threats by isolating them to the user or device level, and employing an applicable policy action against an offending user or device. Pulse Policy Secure ties user identity and role information to network and application access, addressing regulatory compliance and audit demands. When deployed with the Juniper SRX Series, Palo Alto Networks and Fortinet firewalls, Pulse Policy Secure provides the ability to provision user session information to an application-aware firewall based on the role of an authenticated user. This empowers customers, with next-generation firewalls, to utilize the user’s role information for the application of granular application-access policies based on a specific user’s identity. Pulse Policy Secure also supports Layer 2 through Layer 7 policy enforcement with Juniper SRX Series Firewalls, offering unparalleled visibility into application traffic at Layer 7 by leveraging SRX Series Firewalls for the data center.
Pulse Policy Secure also enables any user authenticated via Microsoft Active Directory to be silently provisioned to SRX Series gateways, transparent to the end user. End users do not need to launch a Web browser and authenticate via captive portal. Pulse Policy Secure enables dynamic, identity focused, role-based firewalling with SRX Series gateways, without any user interaction required. Likewise, when deployed with Palo Alto Networks or Fortinet Firewalls, Pulse Policy Secure auto-provisions User Identity, IP address and role information so that access policies can be enforced. Via the host-checking capabilities of the Pulse Client or a MDM Client, Pulse Policy Secure detects unauthorized devices for remediation and compliance enforcement.
To aid in Bring Your Own Device (BYOD) initiatives, Pulse Policy Secure works with market leading Mobile Device Management (MDM) systems to extend its context aware capabilities, deployment simplicity and management cooperation. Integration between these systems enables IT professionals to create policy based on mobile device type, state, location, installed applications, etc. Policy reporting integrates this information within the management console simplifying security management operations.
Federation
Pulse Policy Secure enables the federation—or sharing— of user session data with Pulse Connect Secure (SSL VPN), seamlessly transitioning remote access user sessions to LAN user sessions at login, or alternatively local LAN user sessions into remote access sessions. The federation of LAN access and remote access session data is a vital part of the context awareness and session migration capabilities of Pulse Secure. This enables a remote access user connected via SSL VPN to Pulse Policy Secure to be granted seamless access to the LAN through the same or different Pulse Policy Secure instances, without re-authentication. No re-authentication is required, enabling “follow-me” policies regardless of the user’s device or worldwide location.
Guest Access Management
Pulse Policy Secure offers built-in, advanced guest user access control capabilities to deliver a simple, seamless, and authorized network resource access for customers, partners, and contractors. Guests can self-register to request and obtain appropriate authorized access from any device. After registering, guests can be automatically notified of their authorized and time-limited guest credentials via SMS or email. This solution allows our customers to automatically manage network use by guest and contractors, and reduces threats from unauthorized users and compromised devices.
Additional enterprise-grade features are: Customization with corporate branded guest access portal, an option to create unique data-entry fields for guest names, sponsors, email, mobile numbers and acceptance of use. It also enables selected guest user enterprise account managers to provision temporary guest access accounts for corporate guest users, to create bulk accounts for numerous guest users, and to send automatically guest user credentials via email or text message to an expected guest user, simplifying the network guest access process.
Endpoint Compliance and Patch Assessment
Pulse Policy Secure offers an industry-leading variety of endpoint host checks to ensure compliance, including predefined checks for third-party endpoint security software including anti-virus, firewall, anti-malware/anti-spyware applications, and custom rules for a variety of other endpoint requirements. Pulse Policy Secure offers device patch assessment checks, including endpoint inspection for targeted operating system or application hot fixes, with optional integration for Windows for devices that do not meet policy and require patch updates.
Open Standards
Pulse Secure is a strong supporter of open standards, including those of the Trusted Computing Group’s (TCG) Trusted Network Connect (TNC) Work Group, which ensure interoperability with a host of network and security offerings. Through its support of the TNC standard Statement of Health (SOH) protocol, Pulse Policy Secure with optional SOH license interoperates with the Microsoft Windows SOH and embedded Microsoft Network Access Protection (NAP) Agents, enabling you to use existing Microsoft Windows 10, Windows 8.1, Windows 8, Windows 7, Windows RT, and/or Windows Vista. Pulse Policy Secure also supports the TNC’s open standard Interface for Metadata Access Point (IF-MAP) through a license option, enabling integration with third-party network and security devices—including nearly any device that supports the IF-MAP standard and collects information about the happenings on, or status of, your network. The Pulse Policy Secure can leverage this data when formulating access control decisions, taking any necessary and appropriate actions.
Quick, Easy Deployment
Network access control with Pulse Policy Secure is deployed quickly and easily. It includes an optional “step-by-step” configuration wizard to aid administrators in configuring common network access control (NAC) deployment scenarios. Pulse Policy Secure also allows you and your users to ease into policy enforcement by enabling access control to be phased in, as well as allowing it to be run in audit mode. Light-touch deployment wizards are available to support best practices guidelines. Also, Juniper SRX Series gateways can be deployed in transparent mode with Pulse Policy Secure, simply acting as a “bump in the wire” (BITW), eliminating the need to modify your network’s routing topology. Mobile Device Management (MDM) systems such as those from MobileIron and Airwatch can be leveraged to transparently deploy and configure Pulse Secure clients to Android and iOS devices facilitating deployment efforts to remote devices. And lastly, it has also been tested to work with select Cisco and HP Aruba Network Wireless LAN equipment.
Architecture and Key Components:
Pulse Policy Secure uses three core components to deliver a context (who, what, where, when, etc) aware network and application access control:
PSA Series, MAG Series, or Virtual Machines
Pulse Policy Secure is the network and application access control software which runs on the Pulse PSA Series or MAG Series Appliances, as well as a virtual machine over KVM or VMWare hypervisors. Pulse PSA Series or MAG Series Appliances are purpose-built, centralized policy management hardware that work with the Pulse Secure Client or in clientless mode to obtain user authentication, device security posture, and device location data from a user’s endpoint device.
This data creates dynamic policies that are propagated to policy enforcement points throughout the distributed network worldwide. Pulse Policy Secure leverages the policy control engine from Pulse Connect Secure, as well as their ability to seamlessly integrate with existing authorization, authentication,and accounting (AAA) and identity and access management (IAM) infrastructure. It also integrates RADIUS capabilities and enhanced services from Pulse Secure’s SBR (Steel-Belted Radius) Enterprise Series Servers, to support an 802.1X transaction when a mobile or non-mobile device attempts network connection. Pulse Policy Secure and Pulse PSA or MAG Series Appliances may also be licensed as standalone RADIUS servers.
You may simply deploy a single Pulse PSA or MAG Series Appliance running Pulse Policy Secure with your existing vendor-agnostic 802.1X switches or wireless access points.
Pulse Secure Client and Clientless Mode Deployments
Pulse Secure Client is our integrated, multifunction enabling interface, which can be dynamically downloaded and provisioned to endpoint devices in real time. It provides the user interface to Pulse Policy Secure, as well as other Pulse Secure services. The same Pulse Secure client can be used in wired, wireless, or combined deployments. Pulse Policy Secure also provides a clientless mode for circumstances where software downloads are not feasible. Pulse Policy Secure can be delivered based on role, linking client-based or clientless access dynamically to user or device identity.
Pulse Client or clientless mode collects user and device credentials, and assesses the device’s security state. It leverages and integrates with the native 802.1X supplicant available within Microsoft Windows to deliver comprehensive L2 access control. Pulse Client can also support native 802.1X supplicants on Apple Mac OS X and iOS, and Google Android devices for L2 authentication. Pulse Client, along with Pulse Policy Secure, also provides L3 authentication and IPsec tunneling with any Juniper firewall, including the SRX Series, as an optional secure transport to enable encryption from the endpoint to a firewall for session integrity and privacy, as well as single sign-on (SSO) to Microsoft Active Directory and silent provisioning to SRX Series gateways.
Pulse client includes our Host Checker functionality, enabling you to define policy that scans both mobile and non-mobile devices attempting to connect to your network for a variety of security applications and states both through the Pulse client and leveraging attributes from Mobile Device Management (MDM) systems from AirWatch and MobileIron and others. For Windows and Mac OS X based devices, Host Checker scans for active antivirus, anti-malware, and personal firewalls. It also enables custom checks of elements such as registry and port status for Windows-based devices, and can perform a Message Digest 5 (MD5) checksum to verify application validity. Mobile devices running Apple iOS or Android initially connect to a Pulse Connect Secure (SSL VPN) which runs Host Checker on the mobile device to check its security posture. This host check includes device and OS identification, detection of jail broken or rooted devices, device type, and more. It can also leverage integration with MDM systems to execute health check and set policy based on a wider set of attributes for Apple iOS and Android-based devices. If the mobile device passes the host check and the user is authenticated, appropriate network access is granted. At that time, the user’s session information is shared between Pulse Connect Secure and the Pulse Policy Secure via the TNC IF-MAP protocol. Pulse Secure then pushes the appropriate access policies for the user and mobile device to the Juniper SRX, Palo Alto Networks or Fortinet firewall.
Pulse Policy Secure and Host Checker can also assess a Windows endpoint during machine authentication, mapping the device to a different role and placing it into remediation based on assessment results. This deployment is simplified through predefined Host Checker policies, as well as the automatic monitoring of antivirus and antispyware signatures and patches for the latest definition files for posture assessment. Network access is also directly tied to the presence or absence of specific, defined operating systems, application patches, and “hot fixes.” Role-based, predefined patch management checks are conducted according to the severity level of the vulnerability.
Pulse Client also integrates with antispyware/anti-malware protection for Microsoft Windows endpoint devices that attempt network access, scanning device memory, registry and load points, and preauthentication for spyware and keyloggers.
It supports Layer 2 and Layer 3 authentication and device integrity assessments for devices running Microsoft Windows 10 Enterprise (64-bit), Windows 8.1 / 8 Enterprise (32- and 64-bit), Windows 7 Enterprise (230 and 64-bit), Windows Vista (32- and 64-bit) operating systems. It also supports Layer 3 authentication and device integrity assessments for devices running Apple Mac OS X 10.6 (or higher) operating system software, and devices running Apple iOS or Google Android (integration with Pulse Connect Secure only).
Policy Enforcement Points (PEPs)
Pulse Policy Secure enforcement points include any 802.1X compatible wireless access point or switch, virtual and physical This includes the Juniper Networks EX2200, EX3200, and EX4200 Ethernet Switches, as well as the EX8200 line of Ethernet switches. It also includes the WLA Series and AX411 WLAN access points; any Juniper firewall platform, including the SRX Series gateways; J Series Services Routers (running up to Juniper Junos operating system 10.4); and Juniper standalone IDP Series appliances.
Juniper firewall products, including the SRX Series, can act as Layer 3 through Layer 7 overlay enforcement points for the Pulse Policy Secure. For organizations desiring Layer 2 port- based enforcement, support for vendor-agnostic 802.1X switches and wireless access points by Pulse Policy Secure enables them to quickly realize the benefits of NAC without requiring a hardware overhaul. Also, it supports branch SRX Series gateways, including the Juniper Networks SRX100, SRX110, SRX210, SRX220, SRX 240, SRX650 and virtual appliances such as Firefly Perimeter Services Gateways as 802.1X RADIUS clients, saving cost as well as providing 802.1X support for branch offices.
The EX Series switches1 can allow you to manage security and access control policies from a centralized PSA Series or MAG Series running Pulse Policy Secure. Whenever a device completes 802.1X or MAC authentication, Pulse Policy Secure will push a user/ rolebased authentication table entry to the EX Series switches, which will dynamically provision an access control list (ACL) to the switch port for that particular device. This alleviates the need for administrators to create hundreds of ACLs statically on individual switches, saving time and cost. Pulse Policy Secure and EX Series switches also allow centralized management for Web authentication. When a user connects to an EX Series switch port that has been enabled for Web authentication, the EX Series switch will perform a URL redirect to a PSA Series or MAG Series appliance running Pulse Policy Secure, which will return a captive portal authentication page to the user. And, with Pulse Policy Secure and EX Series switches, administrators no longer need to pre-provision switch ports to be dedicated for a specific purpose. Instead, all EX Series switch ports are configured with a shared policy, and the combination of Pulse Policy Secure and the EX Series switch tailors authentication and access to whatever or whoever is attaching to the port, significantly increasing usability and simplifying administration. Also, EX Series switches can apply quality of service (QoS) policies or mirror user traffic to a central location for logging, monitoring, or threat detection with IPS.
J Series routers may also serve as Layer 2 policy enforcement points. (J Series routers running Junos OS 10.4 or earlier may also serve as Layer 3 enforcement points for Pulse Policy Secure .)
With SRX Series gateways with intrusion prevention system delivering coordinated threat control, and standalone IDP Series appliances serving as role-based, application-level policy enforcement points, Pulse Policy Secure delivers granular identity- and role-based, access control to, and visibility into the application layer within your network. Also, Pulse Policy Secure coupled with SRX Series gateways enables user role- based AppSecure policies. Pulse Policy Secure and the SRX Series2 enable the configuration of application-aware firewall policies based on an authenticated user’s role in Pulse Policy Secure, empowering deployed SRX Series gateways to utilize the user’s role information for the application of granular policies for application access based on a specific user’s identity.
Many Juniper firewalls also support Unified Threat Management (UTM) capabilities, including IPS functionality, network-based antivirus, antispam, anti-adware, antiphishing, and URL filtering capabilities. This functionality can be dynamically leveraged as part of Pulse Policy Secure to enforce and unify access control and security policies on a per user and per session basis, delivering comprehensive network access and threat control. Pulse Policy Secure enforcement points, including the SRX Series gateways, may also be implemented in transparent mode, which requires no rework of routing and policies or changes to the network infrastructure. They may also be set up in audit mode to determine policy compliance without enforcement, enabling you and your users to ease into network access control (NAC).
1 Running Junos OS 12.2 or higher
2 Only for SRX Series gateways running Junos OS 12.1 or higher
Tech Info:
BYOD Onboarding
Automated configuration of devices with settings and software for Wi-Fi, VPN, and more.
Compliance Auto-Checks
Enhanced assessments of endpoint device health and security state.
Comprehensive Visibility
Profile on-network endpoints for verification and remediation.
Granular Auditing and Logging
Simplifies the diagnosis and repair of network issues that arise.
Guest Access Management
Ability to create time-limited guest accounts - and provide a seamless user experience.
Interoperability
Adopts and utilizes the TNCs open standard IF-MAP. Enables easy integration with third-party network and security devices.
Centralized Command
High-level control, with mechanisms for synchronized configuration across many sites.
Patch Assessment and Remediation
Minimizes downtime through automatic remediation of patches for endpoint devices.
That's just the beginning, take a look at features and benefits tab for more information.
Features and Benefits:
Visibility
Pulse Policy Secure is self-administering—intelligently quarantining noncompliant users and devices, and delivering extended remediation capabilities. It also provides automatic remediation for noncompliant devices, many times without user intervention or other assistance.
Feature | Feature Description | Benefits |
---|---|---|
On-box Pulse Secure Profiler |
|
|
Advanced Network and Application Protection
Feature | Feature Description | Benefits |
---|---|---|
Role-based, application-level enforcement |
|
|
Automated patch assessment checks and remediation (optional) |
|
|
Coordinated threat control (CTC) | Leverages robust features and capabilities of the SRX Series gateways for data center and branch, as well as the IDP Series appliances to deliver broad L2 through L7 visibility into application traffic isolating a threat down to the user or device level, and employing specific configurable policy action against the offending user or device. |
|
Captive portal |
|
Provides network access control for guests and contractors. |
Identity-Enabled Network and Application Control
Pulse Policy Secure correlates user identity and role information to network and application security and usage. With the Pulse Policy Secure, you will know who is accessing your network and applications, when your network and applications are being accessed, what is being accessed, and where the user has been on your network.
Feature | Feature Description | Benefits |
---|---|---|
Federation |
|
|
Identity-enabled firewalls | Combines identity-aware capabilities of Pulse Policy Secure with the robust networking and security services of the SRX Series Firewalls, Palo Alto Networks and Fortinet Firewalls5, enabling SRX Series, Palo Alto Networks and Fortinet Firewalls to be employed as policy enforcement points. | Drastically increases scalability for data center environments and branch offices alike. |
User role-based AppSecure policies |
|
Adds identity-awareness to application- aware firewall policies, delivering fi access control granularity |
Mobile Device Management (MDM) Integration |
|
Reduces complexity and increases policy intelligence to simplify and secure BYOD efforts for both IT and end-users |
Standards-Based, Interoperable Access Control
Pulse Policy Secure provides standards-based, vendor-agnostic access control and seamless support for existing, heterogeneous network environments. It leverages industry standards that include RADIUS, IPsec, and innovative, open standards such as the TNC’s standards for network access control and network security. Pulse Policy Secure has been built on industry-leading products, including the policy engine, AAA, and Host Checker capabilities of PSA or MAG Series Appliance, as well as the RADIUS capabilities from SBR (Steel-Belted Radius) Enterprise Servers.
Feature | Feature Description | Benefits |
---|---|---|
TNC open standards support, including IF-MAP support and Windows SOH and embedded NAP Agent support (optional) |
|
|
EX Series switch interoperability |
|
Delivers a complete, standards-based, bestin-class access control solution, allowing organizations to enjoy value-added features and economies of scale for support and service. |
Support for RADIUS CoA | Without starting entire process of authentication, RADIUS CoA allows devices to change the VLAN/ACL for the endpoint based on roles. | Provides expanded interoperability with Cisco, HP/ Aruba and Brocade/Ruckus network infrastructure. No firewall enforcement is required. |
SNMPv1/v2c/v3 Support |
|
|
Simple, Flexible Deployment
Pulse Policy Secure enables organizations to begin controlling network and application access quickly and simply. Organizations are encouraged to initiate network access control with the Pulse Policy Secure in a phased approach, beginning with a small deployment and growing to support hundreds of thousands of concurrent users through its unparalleled scalability.
Feature | Feature Description | Benefits |
---|---|---|
Guest access support |
|
Enhances and simplifies an organization’s ability to provide secure, differentiated guest user access to its network and resources. |
Centralized policy management |
|
|
Common access licensing |
|
Simplifies the product licensing model that can be used across NAC and SSL VPN deployments. Note: Please see the Ordering Information section for the new common access license SKUs that can now be used for Pulse Policy Secure and Pulse Connect Secure. |
Wizard-based configuration |
|
Aids administrators in navigating and familiarizing themselves with configuration tasks in Pulse Policy Secure admin UI. |
Intutitive dashboard | New dashboard design provides:
|
The rich data representation of endpoints visibility, activity monitoring and system overview enables administrators to quickly analyze and troubleshoot overall network security posture assessment. |
Dynamic authentication policy |
|
|
Dynamic addressing of unmanageable endpoint devices | Employs media access control (MAC) address authentication via RADIUS, in combination with MAC address whitelisting and blacklisting; or, leverages existing policy and profile stores (through LDAP interfaces) or asset discovery or profiling solutions for role- and resource-based access control of unmanageable devices such as networked printers, cash registers, bar code scanners, VoIP handsets, etc. |
|
Pulse Secure/ Pulse Policy Secure localization | Provides localized UI, online help, installer, and documentation for Pulse Secure, supporting the following languages: - Chinese (Simplified) - German - Chinese (Traditional) - Japanese - English - Korean - French - Spanish |
Enables organizations to effectively deploy Pulse Policy Secure worldwide. |
Granular auditing and logging |
|
|
RADIUS only appliance (optional) | Optional license enables Pulse MAG4610, MAG6610, and MAG6611 Appliances to be deployed as RADIUS only appliances, using many of the features and functions found within the SBR Enterprise Series servers as a basis for its AAA and RADIUS capabilities. |
|
How It Works:
Complete access control of who, what, when and where with Pulse Policy Secure.
Specifications:
Pulse Secure client, as the user interface for Pulse Policy Secure, supports Microsoft Windows 10, Windows 8, Windows 8.1 Windows 7, Windows RT and Windows Vista SP2 operating systems. Pulse Secure also supports Apple Mac OS X 10.6 (or higher) operating system software, Apple iOS, and Google Android.
Clientless mode secures devices running Microsoft Windows 10, Windows 8.1, Windows 8.0, Windows 7, and Windows Vista SP2 operating systems, Apple Mac OS, and Linux operating systems and platforms including Fedora, Ubuntu and openSUSE, interoperating with supported browsers which include Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari.
For specific supported operating system software, operating platforms, and browser versions, please refer to the latest version of the Pulse PSA or MAG Series Appliance document, which may be found at www.pulsesecure.net.
Product Options:
There are several licensing options available for Pulse Policy Secure.
Product Licenses | Product License Description | Supported Appliances |
---|---|---|
Common access licenses |
|
PSA300, PSA3000, PSA5000, PSA7000c/f, MAG2600, MAG4610, MAG6610, MAG6611 |
Enterprise licenses |
|
PSA300, PSA3000, PSA5000, PSA7000c/f, MAG2600, MAG4610, MAG6610, MAG6611 |
IF-MAP server licenses |
|
PSA300, PSA3000, PSA5000, PSA7000c/f, MAG2600, MAG4610, MAG6610, MAG6611 |
Pulse Secure Profiler licenses | This license enables organizations to detect and classify managed and unmanaged devices (local or remote) on the network for a complete visibility. It also enables RADIUS server functionality for AAA/ RADIUS services running on Pulse PSA or Virtual appliances. | PSA-300, PSA3000, PSA5000, PSA7000c/f |
OAC-ADD-UAC licenses | This license enables Pulse Policy Secure support to be added to existing Juniper Networks Odyssey Access Client licenses, enabling OAC to be used as the agent/supplicant for Pulse Policy Secure. | PSA300, PSA3000, PSA5000, PSA7000c/f, MAG2600, MAG4610, MAG6610, MAG6611 |
Role-based licenses |
|
PSA300, PSA3000, PSA5000, PSA7000c/f, MAG2600, MAG4610, MAG6610, MAG6611 |
Juniper SRX Series rolebased firewall license |
|
PSA300, PSA3000, PSA5000, PSA7000c/f, MAG2600, MAG4610, MAG6610, MAG6611 |
Documentation:
Download the Pulse Secure Pulse Policy Secure Datasheet (.PDF)
Our Price: $800.00
Our Price: $5,400.00
Our Price: $13,000.00
Our Price: $520.00
Our Price: $3,510.00
Our Price: $8,450.00
Our Price: $14,630.00
Our Price: $780.00
Our Price: $5,270.00
Our Price: $12,680.00
Our Price: $940.00
Our Price: $6,320.00