Pulse Cloud Secure

Seamless and Compliant Access to SaaS and Mission-critical Data Center Applications. Discover How Easy it is to Enable Secure Access to Cloud applications.

Banner CloudSecure3

Secure Access to Cloud Platforms like Office 365, Salesforce, and Dropbox

Enterprises need to secure access for mobile workforces while boosting productivity and compliance. Simple, seamless, and friction-free connectivity is crucial for business continuity, productivity, and expansion. Pulse Cloud Secure’s Single Sign-on (SSO) streamlines user experience and reduces the chance of stolen credentials while enabling automatic access to applications and services.

Friction-free User Experience
Column Icon

Security should not be a barrier – workers don’t care where their apps are coming from. Access should be seamless and transparent.

Simplified, Secure Hybrid IT Access
Column Icon

Blending secure access across applications deployed in data centers, and public and private clouds should be simple, not a complex exercise in administration and interoperation.

Increased Compliance
Column Icon

As applications become increasingly dispersed, ensuring that the devices accessing data are compliant is critical in preventing data breaches and malware spread, especially as more of us work remotely.

Mobile Ready
Column Icon

For an increasingly BYOD mobile workforce and integration with leading EMM/MDM solutions for security and compliance enforcement.

Cloud Secure Advantages

With industry-standard SAML 2.0-based SSO, a seamless user experience, integration with leading IdP providers, Pulse Cloud Secure offers next-generation secure access. Other solutions do not offer a friction-free user experience for simplified, secure hybrid IT access, nor the peace of mind with stateful endpoint host checking for broader compliance.

Comprehensive Single Sign-on (SSO)

Supports SAML 2.0 SSO, Kerberos Constrained Delegation, form-based NT LAN Manager to seamlessly connect legacy applications. Other solutions tend to concentrate on web applications.

Cloud Compliance

Stateful endpoint security and compliance assessments ensure only authorized users with trusted devices have cloud and data center access. This is a key advantage we offer to reduce the chance of malware penetrating your network while keeping workers productive.

Extensible Identity Management

Pulse Connect Secure can serve as a SAML Identity Provider (IdP) and as a SAML Service Provider (SP) and offers easy integration with 3rd party management providers. This helps avoid single-vendor solutions and lock-in.

Frictionless User Experience

Simplified SSO access to data center and multi-cloud from laptops and mobile devices using our single, unified client. Users don’t have to install other clients or learn new workflows to access the applications they need.

Policy-controlled Connectivity

Fully Qualified Domain Name (FQDN) split-tunneling enables simplified provisioning of cloud access by domain instead of individual IP addresses. Other solutions often require entering many IP addresses, increasing the possibility of misconfiguration.

Feature Highlights

Block Icon

Enable Secure Use of Popular Cloud Applications

Google G Suite, Microsoft Office 365, Salesforce, Concur, Box, and Dropbox.
Block Icon

Deliver Frictionless User Experience

Simplify user access to the data center and cloud with SSO.
Block Icon

Provide Compliance and Control

Grant cloud access based on user authentication and device posture.
Block Icon

Simplified Administration

Centrally manage access policies for SaaS and data center.
Block Icon

Scale Connectivity to Hybrid IT

Cloud Secure access is direct from the endpoint once it’s authorized.

Supercharge Cloud Connectivity

Pulse Cloud Secure’s Single Sign-on (SSO) eliminates workers’ needs for multiple passwords and provides automatic access to applications and services. In addition, Cloud Secure interoperates with third-party identity and access management (IAM) vendors for added flexibility.

It combines streamlined user access, authentication, and compliance so your mobile, modern workforce is protected while accessing applications and resources in the cloud and data center – and remain secure and productive regardless of their location.

CloudSecure D1
  • Key Features

  • Key Use Cases

  • Benefits

Simple, Straightforward Single Sign-on for All Your Multi-cloud applications

  • Supports SAML-based SSO, allowing pre-authenticated users to access resources without re-entering credentials for applications already accessed.
  • Leverages Pulse Secure’s stateful endpoint compliance checks, ensuring only authorized users with trusted devices access your data.
  • Centralized management of policy, compliance, and authorization for the cloud and data center using Pulse One.
  • Integration with EMM providers and Pulse Workspace enabling mobile workers to seamlessly and securely access cloud and data center resources.
  • Cloud Secure can serve as a SAML Identity Provider (IdP) and as a SAML Service Provider (SP) to verify and validate identities for Zero Trust access.
  • Cloud access direct from the endpoint once authorization is complete for faster throughput and better performance.

Transform your VPN solution with Pulse Cloud Secure and Pulse Connect Secure

  • Enforce multi-factor authentication (MFA) for access to hybrid IT environments.
  • Provide SSO using an on-premises identity store.
  • Ensure security compliance for laptops, smartphones, and tablets using Host Checker.
  • Enable data protection/isolation with on-demand connectivity.
  • Eliminate data center hair-pinning (backhauling) by optionally sending authentication, authorization, and compliance check traffic to Pulse Connect Secure while sending application data directly to the cloud.
  • Enforce role-based access control based on specific roles assigned to users.
  • Notify based on compliance failures to users about the reason for failure and necessary steps to remediate the device back to a compliant state.
  • Support SSO for on-premises users authenticated to Pulse Policy Secure (PPS) by sharing session information through IF-MAP.

Secure access to applications for only authorized users, preventing data loss and leakage, reducing stolen credentials, and raising security profiles.

  • End-to-end Secure Access to all resources in Hybrid IT.
  • Compliant-only access for BYOD.
  • Tunneled access for authorization and SSO traffic.
  • Integration with leading EMM/MDM solutions.
  • Optionally use Pulse Workspace for BYOD container security.
  • Enhanced productivity with streamlined access to cloud services from any device.