Generated by GPT-5-mini| Pulse Secure | |
|---|---|
| Name | Pulse Secure |
| Industry | Network security |
| Founded | 2014 |
| Headquarters | San Jose, California |
| Products | SSL VPN, NAC, SDP, UEMS |
| Owners | Ivanti (acquirer) |
Pulse Secure
Pulse Secure is a network security company that developed remote access, network access control, and zero trust products for enterprises and service providers. It evolved from the merger of enterprise security lines and attracted attention for virtual private network (VPN) appliances, software-defined perimeter (SDP) solutions, and unified endpoint management integrations. The company’s technology has been deployed in data centers, cloud environments, and hybrid architectures across large organizations, telecommunications providers, and government agencies.
Pulse Secure traces its lineage to virtual private network and remote access work by companies such as Juniper Networks, Brocade Communications Systems, Cisco Systems, Checkpoint Software Technologies, and F5 Networks. After divestiture from Juniper Networks in 2014, the organization operated independently and drew investment from private equity firms including Siris Capital Group. Strategic actions and product evolution followed trends set by firms like Palo Alto Networks, Fortinet, and Symantec Corporation. Over time, Pulse Secure pursued partnerships and integrations with cloud providers such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform while aligning with standards bodies including the Internet Engineering Task Force and vendor ecosystems represented at events like RSA Conference and Interop. In 2020, the company’s corporate trajectory intersected with acquisition activity involving Ivanti, reshaping ownership and go-to-market approaches.
Pulse Secure offered a portfolio addressing remote access, access control, and endpoint compliance. Flagship offerings included SSL VPN appliances and virtual appliances comparable to products from Cisco Systems's AnyConnect, F5 Networks' BIG-IP Access Policy Manager, and Citrix Systems NetScaler Gateway. Network access control (NAC) and posture assessment features competed with solutions from Aruba Networks (a Hewlett Packard Enterprise company), ForeScout Technologies, and Tanium. The company also marketed a software-defined perimeter (SDP) approach akin to initiatives by Google's BeyondCorp and vendors such as Zscaler and Okta for identity-centric access. Management and analytics functions integrated with platforms from Splunk, ServiceNow, and VMware while endpoint management tied into offerings from Microsoft Intune and MobileIron (now part of Ivanti). Professional services, training, and support were offered via channel partners including distributors like Tech Data and systems integrators such as Accenture and Deloitte.
Pulse Secure’s architecture combined appliance-based and software-based components to enable secure connectivity, authentication, and policy enforcement. Core elements included SSL/TLS-terminated gateway nodes similar to architectures used by Akamai Technologies and Cloudflare, client applications akin to those from Citrix Systems, and centralized management servers comparable to Cisco Systems Prime Infrastructure. Authentication integrations supported identity providers such as Okta, Microsoft Azure Active Directory, and RSA SecurID, and multifactor methods from vendors like Symantec Corporation VIP and Duo Security (acquired by Cisco Systems). The platform supported protocols and standards advanced by the IETF and authentication frameworks associated with OAuth, SAML, and RADIUS systems. High-availability and scale-out topologies aligned with deployment patterns used by service providers like Verizon and cloud operators such as Rackspace.
Pulse Secure products were subject to scrutiny following disclosure of vulnerabilities and active exploitation campaigns, a pattern seen across vendors including Microsoft Corporation and SolarWinds in high-profile incidents. Researchers and government entities such as US-CERT and security firms like FireEye and Mandiant reported advisories related to remote code execution and authentication bypasses that affected enterprise deployments. Remediation practices mirrored industry responses by organizations like Rapid7 and Qualys, involving patching, configuration changes, and threat hunting. Incident response engagements were conducted by consultancies such as CrowdStrike and Kroll to contain compromises and perform forensic analysis. Public disclosure and coordinated vulnerability disclosure frameworks involved stakeholders from NIST and coordinated disclosure timelines used by vendors across the sector.
Pulse Secure operated as an independent firm following separation from Juniper Networks until private equity investors influenced governance, similar to transitions experienced by Avaya and Dell Technologies. Board-level oversight and executive leadership featured veterans with backgrounds at companies like Oracle Corporation, IBM, and Cisco Systems; channel and OEM strategies mirrored those of Hewlett Packard Enterprise and Dell Technologies. In a later stage, the company’s assets and product lines were acquired by Ivanti, consolidating capabilities with endpoint management and IT service management suites from firms such as Landesk and Quest Software.
Pulse Secure competed in markets occupied by established security vendors and emerging zero trust specialists. Primary competitors included Cisco Systems, Palo Alto Networks, Fortinet, F5 Networks, Citrix Systems, Zscaler, and Okta. Market dynamics were influenced by mergers and acquisitions involving Broadcom, VMware, and Symantec Corporation parent transactions, and by standards and frameworks advocated by Gartner and Forrester Research. Customer selection factors paralleled those evaluated by enterprises working with integrators like IBM and Accenture, and by service providers such as AT&T and Verizon Business when designing managed secure access offerings.
Category:Network security companies