Pulse Secure, LLC
Private | |
ISIN | 🆔 |
Industry | Network security |
Founded 📆 | October 2014 |
Founder 👔 | |
Headquarters 🏙️ | San Jose, California |
Area served 🗺️ | Worldwide |
Key people | |
Products 📟 | |
Revenue🤑 | Not disclosed |
Members | |
Number of employees | |
🌐 Website | pulsesecure |
📇 Address | |
📞 telephone | |
Footnotes / references [1] [2] |
Pulse Secure, LLC is a software company that provides security products based on network appliances, virtual appliances and cloud services. The company focuses on zero trust secure access. The company’s secure access products include VPN, SDP, NAC, EMM and ADC.[3]
Pulse Secure has over 20,000 enterprise customers.[4] The company is based in San Jose, California and has offices in the United States, United Kingdom, India, Japan and China.
History[edit]
Siris Capital established Pulse Secure in October 2014 upon the acquisition of the Juno Pulse business from Juniper Networks[1] and the acquisition of MobileSpaces[5]. At that time, the acquired assets included Virtual Private Network (VPN), Network Profiling, RADIUS, Network Access Control (NAC), Mobile security and Mobile container technologies, an install base of customers and reseller partners, and over 200 patents.[1] The company integrated products and introduced an Access Suite in February, 2017. In June 2017, Pulse Secure acquired Brocade’s virtual Application Delivery Controller (ADC) business, adding load balancing, network visualization and Web Application Firewall (WAF) technology based on the original Zeus's Aptimizer technology.[6] In February of 2017, the company released Pulse SDP, Software Defined Perimeter as an add on to its Access Suite.[7]
Security Issue[edit]
In March 2019, an authentication by-pass vulnerability was identified in Pulse Connect the Secure (PCS) VPN and Pulse Policy Secure (PPS) NAC. Pulse Secure released a patch fix to customers on April 24, 2019 and send out public notifications of the Security Advisory to customers, resellers and CERTs.[8] The vulnerability could allow a remote unauthenticated user to access system files. The vulnerability was made public during Black Hat presentation in August 2019 by the original threat researchers at DevCore.[9]
References[edit]
- ↑ 1.0 1.1 1.2 Michael Kerner, Sean (Oct 2, 2014). "Juniper Completes Sales of Junos Pulse as Pulse Secure Business Emerges". www.enterprisenetworkingplanet.com. Retrieved 2019-12-23. Unknown parameter
|url-status=
ignored (help) - ↑ "Leadership | Pulse Secure". www.pulsesecure.net. Retrieved 2019-12-23.
- ↑ Andrew, Kellett (February 15, 2019). "On the Radar: Pulse Secure delivers zero trust secure access". Ovum. Retrieved December 23, 2019. Unknown parameter
|url-status=
ignored (help) - ↑ Burt, Jeff (October 3, 2014). "Juniper Spin-Off Pulse Secure Eyes Mobile Management". eWEEK. Retrieved December 23, 2019. Unknown parameter
|url-status=
ignored (help) - ↑ Press, Viva Sarah (2014-10-06). "Pulse Secure acquires BYOD specialist MobileSpaces". Israel21c. Retrieved December 23, 2019. Unknown parameter
|url-status=
ignored (help) - ↑ "Brocade Sells vADC to Pulse Secure, Vyatta to AT&T". www.enterprisenetworkingplanet.com. Retrieved 2019-12-23.
- ↑ "Pulse Secure Adds Software Defined Perimeter to Secure Access Platform". eWEEK. Retrieved 2019-12-23.
- ↑ "Public KB - SA44101 - 2019-04: Out-of-Cycle Advisory: Multiple vulnerabilities resolved in Pulse Connect Secure / Pulse Policy Secure 9.0RX". kb.pulsesecure.net. Retrieved 2019-12-23.
- ↑ Cimpanu, Catalin. "A Chinese APT is now going after Pulse Secure and Fortinet VPN servers". ZDNet. Retrieved 2019-12-23.
External links[edit]
This article "Pulse Secure" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Pulse Secure. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.