• Products
    INTRODUCING THE
    Pulse Access Suite
    It's never been easier to secure your data center, provide mobile access and enable new cloud services. We make Secure Access simple to purchase, deploy and manage.
    Choose from the following editions:
    • Pulse Connect Secure The best mobile VPN for workers.
    • Pulse Policy Secure Policy driven Network Access Control (NAC).
    • Pulse Workspace A mobile workspace for the next generation.
    • OTHER PRODUCTS
    • Pulse One
    • Pulse Secure Appliances
    • Steel Belted Radius
    • VIEW ALL PRODUCTS →
  • Solutions
    • Industry Solutions
      • Financial Services
      • Government
      • Education
      • Healthcare
    • Partner Solutions
      • Palo Alto Networks
      • SAP Fiori Mobile Apps
      • Ruckus Wireless
      • CASQUE SNR
    • Product Solutions
      • Office 365
      • SAML
    • Enterprise Solutions
      • BYOD Mobility
      • Data Roamers
      • Traffic Control
      • Guest User Support
      • Converged Management
      • Secure Access to Cloud Apps
    • VIEW ALL SOLUTIONS →
  • Customers
    • Customer Stories
    • Webinars
  • Partners
    • Partner Program
    • Become a Partner
    • Technology Partners
    • Business Partners
    • Partner Webinars
    • Partner Login
  • Support
    • Support Service Offerings
    • Knowledge Center
    • License & Download Center
    • Case Management
    • Technical Publications
    • Education Services
    • Webinars
    • Forum
    • Support Contacts
    • Login
    • PULSE SECURE SUPPORT →
  • Download
    • Client Downloads
    • Product Trials
    • License & Download Center (Login)
x
Update your hardware, free
Offer expires June 30, 2017
Pulse Secure and CASQUE SNR Identity Assurance
Military Strength Security for Pulse Connect Secure SSL VPN
Authentication techniques based on fixed targets can be compromized and remain undetected
Security compromizes through malware, phishing exploits or even privileged insiders are difficult to detect and prevent, and can easily damage a company’s reputation. CASQUE SNR’s keys are changed dynamically and invisibly, removing fixed targets and so are immune to insider attacks, token clones and manufacturer reveal.
Challenges
  • Flexible workstyle secure access
    Visibility into BYOD environments and offering self-registered guest access.
  • Network surveillance for security orchestration
    Comprehensive policy-based access control that offers real-time monitoring and automated remediation.
  • Easy comprehensive compliance check
    Manage BYOD and other IP-enabled endpoints access to existing networks for policy management, while delivering a café like onboarding experience.
Solution
Identity Assurance for Pulse Connect Secure









  • Resists Clones
    Dynamic Key update forces either the real token or a clone to be out of sync so the clone can’t authenticate.
  • Prevents Insider Attacks
    If a privileged insider copies the CAS Server and gives to a collaborator, there is no risk as the generation of keys cannot be replicated.
  • Customer is Key Custodian
    The customer populates the CASQUE SNR Tokens with locally generated keys so the manufacturer or system intergrator is never part of the security risk.
  • Independent Validation
    The CASQUE SNR has been source code certified by UK CESG and can be suitable for UK Government use at Secret, it is also NATO approved.
  • Secure Backup and Transactional Logs
    Provision is made within the system for secure backup at a remote site with rapid recovery in case of failure. Each access and its outcome are logged.
  • Token is not a Cryptographic Item
    CASQUE SNR Token does not contain the complete key-set. Data in the challenge message unlocks the keys allowing stored encrypted keys to be decrypted and temporarily available in dynamic memory.
Related Products
  • Pulse Policy Secure
    Policy driven Network Access Control (NAC)
  • Pulse Connect Secure
    The best mobile VPN for workers.

We'd love to chat with you

We've got so much to tell you about how our products can help you enable Secure Access for the next generation of your business, but we're also good listeners.