--> The Pulse Connect Secure provides secure and controlled access to give employees, partners to your corporate data and applications including file servers, Web servers, native messaging and e-mail clients, hosted servers, and more from outside your trusted network using just a Web browser.
--> Pulse Connect Secure acts as Proxy between users from outside network to the resources in the internal network.
--> Pulse Connect Secure acts as a secure Application Layer gateway proxying all requests between the public Internet and internal corporate resources.
--> All requests that enter the system are already encrypted by the end user's browser, using SSL/HTTPS 128-bit or 168-bit encryption—unencrypted requests are dropped.
--> The Secure Application Manager intermediates traffic to client/server applications including Microsoft Outlook, Lotus Notes, and Citrix.
--> You can easily configure Connect Secure to use your company’s existing servers to authenticate your end users—Users do not need to learn a new username and password to access the device.
--> Connect Secure enables you to protect against viruses, attacks, and other security concerns using the Host Checker feature.
--> Host Checker performs security checks on the clients that connect to the device. For instance, you can use Host Checker to verify that end-user systems contain up-to-date antivirus software, firewalls, critical software hotfixes, and other applications that protect your users’ computers.
Reference: Pulse Connect
--> Pulse Connect Secure acts as Proxy between users from outside network to the resources in the internal network.
--> Pulse Connect Secure acts as a secure Application Layer gateway proxying all requests between the public Internet and internal corporate resources.
--> All requests that enter the system are already encrypted by the end user's browser, using SSL/HTTPS 128-bit or 168-bit encryption—unencrypted requests are dropped.
--> The Secure Application Manager intermediates traffic to client/server applications including Microsoft Outlook, Lotus Notes, and Citrix.
--> if you want to secure access to your company Intranet, you can use the Web rewriting feature. This feature uses the system’s Content Intermediation Engine to intermediate traffic to Web-based applications and Web pages.
--> You can easily configure Connect Secure to use your company’s existing servers to authenticate your end users—Users do not need to learn a new username and password to access the device.
--> Connect Secure enables you to protect against viruses, attacks, and other security concerns using the Host Checker feature.
--> Host Checker performs security checks on the clients that connect to the device. For instance, you can use Host Checker to verify that end-user systems contain up-to-date antivirus software, firewalls, critical software hotfixes, and other applications that protect your users’ computers.
Reference: Pulse Connect
0 Comments