Videos

Pulse Secure Zero Trust Access Platform

Presenters:
Sudhakar Ramakrishna - CEO Pulse Secure
Rohini Kasturi - CPO Pulse Secure
Read Transcript

Sudhakar Ramakrishna:

Hello, everyone. I'm Sudhakar Ramakrishna, CEO at Pulse Secure. Today, I am here to announce a very significant platform that Pulse Secure has built, called the Pulse Secure Zero Trust Access platform. I have now our CPO, Chief Product Officer, Rohini Kasturi. Rohini, welcome.

Rohini Kasturi:

Sudhakar, super excited to be here.

Sudhakar Ramakrishna:

What are some of the challenges you've picked up as you discussed with our various customers throughout the world?

Rohini Kasturi:

So there are five customer pain points that we have consistently heard through our journey. The first and foremost is, how do you reduce your attack surface in this world of hybrid and multi-cloud IT? That's challenge number one. The second one is complex policy management across different products. The third challenge is, because of these silos, it is very difficult for customers to detect anomalies and breaches in real time. And the fourth challenge is really having end-to-end visibility, compliance and governance, and last but not the least, simplified business models.

Sudhakar Ramakrishna:

Absolutely.

Rohini Kasturi:

Yeah. So, Sudhakar, do you want to touch upon the vision that you have laid out for Pulse Secure and the holy grail of secure access?

Sudhakar Ramakrishna:

Since the time Pulse Secure was formed, we have been on the mission of delivering secure access for people, devices, things, and services. We have continually evolved it into the concept of hyperconvergence. Regardless of who is trying to access, we use a common framework and deliver consistent access across the board. But we do so in a world of zero trust. Before we provide any access, we've got to establish trust. Now that I've defined the approach and the strategy, what are some strategic imperatives that you are implementing, that will allow us to get to that point?

Rohini Kasturi:

First of all, one platform with centralized policy management for our administrators, whether it's IT administrators, or information security administrators, or CIOs, or CSOs who want to centrally manage and centrally policy manage various secure access use cases. That's one.

Rohini Kasturi:

The second one is, one client for various types of users. It could be end users like us, wanting to access applications. It could be lab users or power users wanting to access infrastructure or networks. So we can address various types of use cases through one unified client, irrespective of what type of device they're on. They could be on a Windows device, Mac device, iOS device, Android device, et cetera.

Rohini Kasturi:

The third part of it is, how do you leverage the power of AI and ML to provide insights to customers, to provide anomaly detection to customers, so that they can prevent breaches, they can have better security posture? Last but not the least is simplifying the business models for various use cases, Sudhakar. Those are the five aspects of our hyperconvergence and zero trust access strategies, Sudhakar.

Sudhakar Ramakrishna:

Excellent. Thank you, everyone, for joining us today. I hope you found the briefing on our Zero Trust Access useful, and please feel free to reach out to us. Thank you again.

Rohini Kasturi:

Thank you.