{"id":34,"date":"2017-10-19T11:46:50","date_gmt":"2017-10-19T02:46:50","guid":{"rendered":"http:\/\/sntec.innofish.net\/?page_id=34"},"modified":"2017-12-11T12:37:43","modified_gmt":"2017-12-11T03:37:43","slug":"pulse-secure","status":"publish","type":"page","link":"http:\/\/sntec.co.kr\/en\/solution\/pulse-secure\/","title":{"rendered":"Pulse Secure"},"content":{"rendered":"[spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]\n<div class=\"subtitle\">\n<h2>Pulse Secure<\/h2>\n<\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;2\/3&#8243; el_position=&#8221;first&#8221;]\n<div class=\"bluetitle\">\n<h3>Feature<\/h3>\n<\/div>\n<p>Two defining trends of the IT industry in the\npast half-decade have been the exponential\ngrowth of endpoints and the advent of BYOD\n(Bring Your Own Device).<br \/>\nCrucially, the contemporary workforce perceives\nwork not as a fixed location but as an activity\nthat can be enhanced through the strategic\nadoption of mobile technology.<\/p>\n<p>The proliferation of laptops, tablets, and\nsmartphones has fundamentally altered the\nparadigm of work collaboration and\ncommunication, elevating the strategic\nexpectations placed on IT departments.<br \/>\nIn parallel, enterprise endpoints have advanced\nto include innovative functionalities that\nleverage internet connectivity to simplify daily\ntasks.<\/p>\n<p>The newly engineered Pulse Secure\nAppliance (PSA) series, tailored for heightened\nsecurity services, delivers comprehensive\nendpoint visibility to optimize network\nfunctionality and connectivity irrespective of\ndevice, network, or geographical location,\ncoupled with expedited troubleshooting and\nenhanced reporting capabilities.<\/p>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; el_class=&#8221;pulserightimg&#8221; width=&#8221;1\/3&#8243; el_position=&#8221;last&#8221;]\n<p><img src=\"\/wp-content\/uploads\/2017\/10\/sub3-1.jpg\" \/><\/p>\n[\/spb_text_block] [blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]\n<div class=\"bluetitle\">\n<h3>Enterprise Solutions<\/h3>\n<\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/3&#8243; el_position=&#8221;first&#8221;]\n<div><img src=\"\/wp-content\/uploads\/2017\/10\/sub3-2.jpg\" \/><\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;2\/3&#8243; el_position=&#8221;last&#8221;]\n<div class=\"sub3txt\">\n<h4>Pulse Policy Secure<\/h4>\n<p>Security intelligence is essential for the future\nworkforce.Pulse Policy Secure is an advanced Network Access Control (NAC) solution engineered for the next-gen networks.<\/p>\n<div class=\"featul\">\n<ul>\n<li>Standards-compliant - Executes interoperable\npolicies compatible with a range of third-party\nnetwork and security solutions.<\/li>\n<li>Self-service Provisioning - Streamlines Bring\nYour Own Device (BYOD) processes with\nintegrated onboarding solutions, facilitating\nremote or onsite device setup via existing\nMobile Device Management (MDM) systems.<\/li>\n<li>Customizable Templates - Delivers improved\nguest access with streamlined provisioning that\nminimizes IT intervention.<\/li>\n<li>Integrated Client - Provides continuous\nposture assessment and establishes secure\nconnections in real-time.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/3&#8243; el_position=&#8221;first&#8221;]\n<div><img src=\"\/wp-content\/uploads\/2017\/10\/sub3-3.jpg\" \/><\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;2\/3&#8243; el_position=&#8221;last&#8221;]\n<div class=\"sub3txt\">\n<h4>Pulse Workspace<\/h4>\n<p>An end-to-end security product, Pulse\nWorkspace safeguards mobile access to cloud and data center resources. Pulse Workspace enables all employees to effectively work in mobile scenarios and securely connect to enterprise apps and services, featuring.<\/p>\n<div class=\"featul\">\n<ul>\n<li>On-demand VPN - Enables instant VPN\naccess with certificate-based authentication\nthrough a simple app interface<\/li>\n<li>Android security - Offers a secure Android\nexperience akin to iOS by utilizing application\nvirtualization techniques<\/li>\n<li>Secure container - Prevents personal apps\nfrom accessing enterprise network resources,\ndata, or applications<\/li>\n<\/ul>\n<\/div>\n<\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/3&#8243; el_position=&#8221;first&#8221;]\n<div><img src=\"\/wp-content\/uploads\/2017\/10\/sub3-4.jpg\" \/><\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;2\/3&#8243; el_position=&#8221;last&#8221;]\n<div class=\"sub3txt\">\n<h4>Pulse Connect Secure<\/h4>\n<p>Boosts productivity by accommodating the\nindividual work patterns of mobile and remote\nusers.Pulse Connect Secure simplifies, secures, and strengthens enterprise connectivity.Pulse Secure's trusted mobile access solution\nprovides::<\/p>\n<div class=\"featul\">\n<ul>\n<li>All-encompassing access client - Supports an\nextensive array of devices with a unique,\nintuitive user interface, combined with posture\nchecking and secure connection features<\/li>\n<li>Streamlined, secure, uninterrupted\nconnectivity - Integrates leading-edge Identity\nand Access Management (IAM) and Mobile\nDevice Management (MDM) solutions<\/li>\n<li>Detailed auditing and logging - Offers\ncustomizable monitoring at user, resource, and\nevent levels for both security auditing and\ncapacity plannin<\/li>\n<li>Enhanced scalability - Ensures compatibility\nwith HTML5 and IPv6<\/li>\n<\/ul>\n<\/div>\n<\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/3&#8243; el_position=&#8221;first&#8221;]\n<div><img src=\"\/wp-content\/uploads\/2017\/10\/sub3-5.jpg\" \/><\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;2\/3&#8243; el_position=&#8221;last&#8221;]\n<div class=\"sub3txt\">\n<h4>Pulse One<\/h4>\n<p>Pulse One centrally orchestrates remote,\nmobile, and campus access to data centers and\nthe cloud. This centralized control is realized through rolebased consoles that manage policy\nenforcement, system health reporting, and\nlarge-scale provisioning.<\/p>\n<div class=\"featul\">\n<ul>\n<li>Centralized control - Delivers comprehensive\noversight of corporate access for all types of\nuser access scenarios, adding Enterprise\nMobility Management (EMM) support for both\niOS and Android devices<\/li>\n<li>Centralized device management - Allows\nadministrators to easily replicate configurations\nand policies across multiple devices from a\nsingle dashboard, thereby reducing time spent\nmanaging VPN and NAC infrastructure<\/li>\n<li>User-friendly and secure Software as a\nService (SaaS) offering.IT departments can access the latest platform features without the complexity or ancillary tasks associated with setting up data centers.Pulse One's cloud infrastructure is certified with both SOC2 and ISO 27001 security standards.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n[\/spb_text_block] [blank_spacer height=&#8221;30px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]\n<div class=\"bluetitle\">\n<h3>Major Security Product<\/h3>\n<\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/2&#8243; el_position=&#8221;first&#8221;]\n<div class=\"baduper\">\n<p><img src=\"\/wp-content\/uploads\/2017\/10\/sub3-6.jpg\" \/><\/p>\n<h4>PSA300<\/h4>\n<\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/2&#8243; el_position=&#8221;last&#8221;]\n<div class=\"baduper\">\n<p><img src=\"\/wp-content\/uploads\/2017\/10\/sub3-7.jpg\" \/><\/p>\n<h4>PSA3000<\/h4>\n<\/div>\n[\/spb_text_block] [blank_spacer height=&#8221;20px&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/2&#8243; el_position=&#8221;first&#8221;]\n<div class=\"baduper\">\n<p><img src=\"\/wp-content\/uploads\/2017\/10\/sub3-8.jpg\" \/><\/p>\n<h4>PSA5000<\/h4>\n<\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/2&#8243; el_position=&#8221;last&#8221;]\n<div class=\"baduper\">\n<p><img src=\"\/wp-content\/uploads\/2017\/10\/sub3-9.jpg\" \/><\/p>\n<h4>PSA7000<\/h4>\n<\/div>\n[\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]\n<div class=\"subbtn\"><a href=\"http:\/\/sntec.co.kr\/en\/support\/consulting\/\">Consulting and Technical Support<\/a><\/div>\n[\/spb_text_block]","protected":false},"excerpt":{"rendered":"<p>[spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] Pulse Secure [\/spb_text_block] [spb_text_block pb_margin_bottom=&#8221;no&#8221; pb_border_bottom=&#8221;no&#8221; width=&#8221;2\/3&#8243; el_position=&#8221;first&#8221;] Feature \uc9c0\ub09c 5\ub144\uac04 IT \uc5c5\uacc4\ub97c \uc7ac\ud3b8\ud55c 2\uac00\uc9c0 \ud2b8\ub79c\ub4dc\ub294 \uc5d4\ub4dc\ud3ec\uc778\ud2b8\uc758 \uae09\uc99d\uacfc BYOD\uc758 \ucd9c\ud604\uc785\ub2c8\ub2e4. \ub354\uc6b1 \uc911\uc694\ud55c \uac83\uc740 \uc624\ub298\ub0a0\uc758 \uadfc\ub85c\uac00\ub4e4\uc740 \uc9c1\uc7a5\uc744 \ud558\ub098\uc758 \ubb3c\ub9ac\uc801\uc778 \uc704\uce58\ub85c \uc0dd\uac01\ud558\uae30\ubcf4\ub2e4 \uc9c4\ud654\ud558\ub294 \ubaa8\ubc14\uc77c \uae30\uc220\uc744 \ub3d9\uc801\uc73c\ub85c \uc120\ud0dd\ud568\uc73c\ub85c\uc368 \uc0dd\uc0b0\uc131\uc744 \ucd09\uc9c4\ud560 \uc218 \uc788\ub294 \ud65c\ub3d9\uc73c\ub85c \uc0dd\uac01\ud55c\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \uafb8\uc900\ud788 \uc99d\uac00\ud558\uace0 \uc788\ub294 \ub178\ud2b8\ubd81, \ud0dc\ube14\ub9bf, \uc2a4\ub9c8\ud2b8\ud3f0\uc740 \uc0ac\ub78c\ub4e4\uc774 \uc5c5\ubb34\ub97c \uc704\ud574 \ud611\uc5ed\ud558\uace0 \uc758\uc0ac\uc18c\ud1b5\ud558\ub294 \ubc29\uc2dd\uc744 [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/sntec.co.kr\/en\/wp-json\/wp\/v2\/pages\/34"}],"collection":[{"href":"http:\/\/sntec.co.kr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/sntec.co.kr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/sntec.co.kr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/sntec.co.kr\/en\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":6,"href":"http:\/\/sntec.co.kr\/en\/wp-json\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":341,"href":"http:\/\/sntec.co.kr\/en\/wp-json\/wp\/v2\/pages\/34\/revisions\/341"}],"up":[{"embeddable":true,"href":"http:\/\/sntec.co.kr\/en\/wp-json\/wp\/v2\/pages\/18"}],"wp:attachment":[{"href":"http:\/\/sntec.co.kr\/en\/wp-json\/wp\/v2\/media?parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}