Story image

EMA names Pulse Secure leader in hybrid IT secure access platform solutions

27 Aug 18

IT analyst Enterprise Management Associates (EMA) has named Pulse Secure a leader in hybrid IT secure access platform solutions.

Pulse Secure was selected by EMA as a top three vendor in three-related product categories and was the only vendor among more than 60 assessed to achieve the highest ratings across these Hybrid IT categories.

Driven by digital business transformation, the world of securing access to enterprise applications, data and other IT services continues to evolve at a rapid pace.

Emerging requirements for workforce mobility, distributed data centres, virtual and cloud-based IT environments, and data protection have yielded significant access control complexities. 

Founded in 1996, industry analyst EMA specialises in providing insight across IT and data management technologies.

EMA conducted research to identify the access security issues facing organisations today, including a survey of executives from over 200 enterprises and an analysis of hundreds of vendor product briefings, case studies and demonstrations.

The published report identified ten priorities for enabling secure access to enterprise IT services and offers insight into key challenges, considerations and technologies.

The report also supports IT decision makers’ vendor-selection process as it names 30 of the most innovative vendor solutions addressing the greatest array of requirements for secure access enablement, highlighting Pulse Secure’s leadership ranking across three categories:

  • Unifying access control across hybrid IT ecosystems
  • Enabling secure remote access to business networks
  • Network Access Control with IoT enablement

Enterprise Management Associates research director Steve Brasen says, “Increased pressure to enable workforce mobility and scale IT services across a variety of data centre, public and private cloud environments have challenged organisations to grant secure and reliable access.”

“Based on the breadth, depth and interoperability of its solutions, Pulse Secure is distinguished in the market as providing the most comprehensive, integrated and flexible Hybrid IT Secure Access platform.”

 Pulse Secure CEO Sudhakar Ramakrishna says, “EMA’s recognition of Pulse Secure is a testament to our focus on customer needs and our drive to ensure superior user experience while delivering simple, manageable and integrated solutions.”

“Our Secure Access portfolio enables organisations to improve productivity by addressing a wide variety of business, visibility and compliance requirements as they evolve from data centre to hybrid IT environments.”

Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more. 
Dell EMC advances hybrid cloud for VMware environments
Through collaboration and joint engineering, Dell EMC and VMware are enabling organisations to derive more value from IT investments.
ThreatQuotient partners with Visa for payments safety
“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.”
Gartner names Bitglass a leader in cloud security
Bitglass was evaluated based on its ability to execute and its completeness of vision.
Universities seeing rise in DDoS attacks
Overall, between July and September, DDoS botnets attacked targets in 82 countries.
Security cameras – a latent botnet network?
In a comparison of 16 indoor and outdoor IP surveillance cameras, researchers found only one well-protected device.
2018’s worst malware revealed in report
Webroot has highlighted the top cyberattacks of 2018 in its latest Nastiest Malware list, which showcases the malware and attack payloads that have been most detrimental to organisations.
How phishing is evolving to outpace awareness
While email providers have made strides in flagging suspicious emails and source domains, reducing the effectiveness of attacks, attackers’ techniques have also evolved.