RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Pulse Zero Trust Access (PZTA)

Product
Developers: Pulse Secure
Date of the premiere of the system: 2020/07/28
Technology: SaaS - Software as service,  IB - Authentication,  MCDS - Access Control Systems

Main article: SaaS - History. Philosophy. Drivers of development


Pulse Zero Trust Access (PZTA) is a remote access security solution.

2021: PZTA Description

According to March 2021, the Pulse Zero Trust Access (PZTA) platform allows users to easily and securely access applications hosted in a public, private, and multi-cloud environment, providing easy access to enterprise applications and resources in cloud and non-cloud environments without compromising security and performance.

To access resources and applications, PZTA uses the SDP (Software-defined Perimeter) model.

Access to resources and applications can be defined as access from the external environment (most often through VPN), access from the inside (through network access control solutions - NAC), and access to the external environment (most often through the services of numerous identification providers). For SDP/PZTA technologies, there is no clear boundary between the external and internal environment (perimeter), so such programs work with access anywhere and from anywhere.

The use of a PZTA controller (similar to an SDP controller) has made the work of administrators of remote access systems, as well as users themselves, much easier. After the product is implemented, the user connects to the controller (when registration and certificate exchange has passed) and immediately gets access to resources. At the same time, the user does not need to know where the resources are stored. The controller in which the application parameters are sewn is responsible for directing the tunnel to the gateway with the required resource.

Thanks to the central controller, using the resources is simple: everything happens by itself, just turn on the computer, and access will be provided. It is also easy to set up access to various locations in the data center, to many applications stored in the private or public cloud - all this does not require additional actions. Tunnels between the client and the access gateway are dynamically configured, and there may be multiple tunnels at the same time. Moreover, thanks to the central controller, the system configuration takes place in one place, and all the devices used are visible. In addition, the program has an anomaly detection module, as well as a SAML identification provider, which provides transparent authentication for cloud applications.