Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Pulse Secure Named a 2019 TAG Cyber Distinguished Vendor

September 2018 by Marc Jacob

Pulse Secure announced its designation as a Distinguished Vendor in this year’s “2019 TAG Cyber Security Annual.”

Pulse Secure recently became a member of the world’s leading cybersecurity vendors as selected by Dr. Edward Amoroso, CEO of TAG Cyber, and added to this year’s report. Each year TAG Cyber publishes its three-volume report to the IT community for download at no cost. Volume Two of the report also includes an informative interview with Pulse Secure CEO, Sudhakar Ramakrishna.

This year’s "TAG Cyber Security Annual" was developed to assist chief information security officers (CISOs) and security teams as they advance their information enterprise cybersecurity protection programs and best practices. Beyond offering a “periodic table” of cybersecurity controls, the volume offers insights as to key control trends based on expert and practitioner participation.

The 2019 Tag Cyber Volume Two highlighted key trends within 50 top controls. Key findings within Secure Access controls highlighted in the report include:

• Where initial generations of remote access focused on teleworkers and two-factor authentication, next-generation secure access solutions are increasing effectiveness by expediting multi-factor authentication and integrating with modern cloud and mobility platforms

• Leading secure access vendors are delivering solutions equally focused on user experience with the goal of minimizing the steps required to establish secure connectivity

• The future of secure access lies in device-to-cloud, where mobility and embedded controls ensure that authentication, encryption and integrity are in place. While the use of public clouds to host enterprise applications will eventually remove access to the corporate LAN, this function will remain in hybrid mode for several years where traditional remote access will remain in place during this transition period

See previous articles


See next articles