{"id":5109,"date":"2018-07-03T13:40:00","date_gmt":"2018-07-03T13:40:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/"},"modified":"2018-07-03T13:40:00","modified_gmt":"2018-07-03T13:40:00","slug":"pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/","title":{"rendered":"Pulse Secure VPN enhanced to better support hybrid IT environments"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/02\/network_security_locks_cables_thinkstock_481194326-100750741-large.3x2.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>The workplace is changing rapidly as employees embrace mobility, applications are in the cloud, and Internet of Things (IoT) devices are instrumented for continuous connectivity \u2014 and this is affecting how organizations must think about secure access. Regardless of the scenario, organizations want solutions that deliver better productivity for whomever (or whatever) is connecting, a consistent user experience, compliance with corporate policies and regulatory requirements, and strong end-to-end security.<\/p>\n<p>This is the playing field for <a href=\"https:\/\/www.pulsesecure.net\/\" rel=\"noopener nofollow\" target=\"_blank\">Pulse Secure<\/a>, a company that has built a broad portfolio of access products and services that are available as a unified platform. Pulse Secure has considered practically every use case and has built a range of solutions to solve the secure connectivity challenges that IT organizations face. The company claims to have more than 20,000 customers and a presence in 80 percent of global enterprises \u2014 maybe even yours.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Read also: <a href=\"https:\/\/www.networkworld.com\/article\/3285968\/internet-of-things\/strange-and-scary-iot-hacks.html#nww-fsb\">Strange and scary IoT hacks<\/a>. | Get regularly scheduled insights: <a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html#nww-fsb\">Sign up for Network World newsletters<\/a>. ]<\/strong><\/aside>\n<p>Pulse Connect Secure is the flagship VPN product in Pulse Secure\u2019s broader portfolio. Itdelivers secure and optimized access to a rich set of applications and services with client and clientless support for desktop, laptops, tablets, and smartphones. Pulse Connect Secure supports mobile initiatives such as BYOD, as well as cloud computing. Rather than having to use multiple approaches for secure access, such as application gateways, cloud access brokers, application wrapping, and cloud authentication, Pulse Connect Secure addresses all those needs with a single solution. It ensures consistent user, role, device, and stateful policy management across computing environments.<\/p>\n<p>Pulse Connect Secure is fully mobile-aware, with features such as certificate-based authentication with an embedded certificate authority and integrated endpoint container. Support for SAML authentication allows enterprises to blend data center and cloud resources into a robust user experience.\u00a0\u00a0<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id=\"\"\/>\n<p>Pulse Connect Secure simplifies network administration and compliance management with a centralized web-based console, end user self-provisioning, and integration with EMM policy management platforms. Centralized appliance management delivers an IT administration experience that enables proactive and rapid responses to security threats and network events. Administrators are able to replicate configuration and policies from one appliance to others and perform bulk operations for firmware updates and policy changes. An administrative dashboard provides appliance status and unified compliance reporting with context-aware visibility of devices and users. Pulse Connect Secure can be deployed as a hardware, virtual, or cloud appliance.<\/p>\n<h2>Pulse Connect Secure supports a changing data center<\/h2>\n<p>Pulse Secure recently announced a new release of Pulse Connect Secure aimed at simplifying connectivity and security in cloud and hybrid IT environments. There are a couple of big customer challenges Pulse Secure addresses with this new product release.<\/p>\n<p>One is the notion of the changing data center. For many organizations, it is becoming a blend of traditional applications running in the on-premise data center, complemented by applications that are hosted in the cloud with service providers like Microsoft, Amazon and a plethora of SaaS providers. In addition, people are using a variety of devices to do work 24\/7. They want to use desktops, laptops, smartphones, and tablets, and they want to access their apps in a secure way that is also friction-free, i.e. without security getting in the way of what they want to do.<\/p>\n<aside id=\"fsb-2599\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\"><strong>[ <a href=\"https:\/\/pluralsight.pxf.io\/c\/321564\/424552\/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fpaths%2Fcertified-information-systems-security-professional-cisspr\" rel=\"nofollow\">Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial!<\/a> ]<\/strong><\/aside>\n<p>Pulse Connect Secure now extends its connectivity and security framework into this new hybrid IT environment such that for users, it is transparent on where applications actually reside. This gives IT the flexibility to add new applications by leveraging the cloud and SaaS applications like Salesforce and Office 365 to enable greater productivity for users. Also, when mobile users connect to these applications, they do it in a way that complies with the corporate security policies.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id=\"\"\/>\n<p>The client on the device, the Pulse Client, ensures the person uses a healthy and secured device to connect into the hybrid IT environment and provides an intuitive user experience for the worker. The client verifies the security of the device through host checking \u2014 all those things that, from an IT standpoint, are indicators that the device is secured.<\/p>\n<p>For a laptop, host checking might involve looking at things such as the version of the operating system and whether antivirus is installed on the platform. For a smartphone or a tablet, the system would look at the OS but also things specific to mobile devices, such as whether the device is jail broken or not. All those characteristics become something of a \u201ccomply to connect\u201d policy. The new release of Pulse Connect Secure extends those comply-to-connect policies to a variety of devices, including macOS computers, which are becoming more commonplace in the enterprise.<\/p>\n<p>The new release of the appliance can now run in Microsoft Azure or Amazon Web Services (AWS), which is important to Pulse Secure customers that want to move an application to the cloud but are confronted with the native cloud security. They will find that the VPN capabilities provided by, say, Amazon or Microsoft aren&#8217;t nearly as robust as what they are used to using within their own data center.<\/p>\n<p>More importantly, the Pulse Secure client that their users have long used to connect to the data center doesn\u2019t work with the native VPN capabilities of AWS or Azure. That can be a big stumbling block that disrupts users\u2019 workflow. Now the new Pulse Secure cloud appliance takes the same framework as what has been used in the data center and brings it to the cloud. There is no change in the end user client, and the policies are consistent within both their data center environment and now within the cloud.<\/p>\n<h2>Administrators\u2019 and end users\u2019 lives get easier<\/h2>\n<p>More enhancements come in the form of ease of use. Pulse Secure has added some features that are intended to make the administrator\u2019s life easier and the end user\u2019s life more productive.<\/p>\n<p>For example, when you think about security for the cloud, there\u2019s the notion of split tunneling. Based on policy, it can be determined whether a user session comes back to the data center or goes to the cloud. It\u2019s a powerful tool to blend the hybrid IT environment together, but it can be cumbersome due to the mappings of IP address spaces. An application or service like Office 365 could have hundreds of IP mappings for an administrator to worry about. The newest release of Pulse Connect Secure eliminates the notion of provisioning by IP address and instead focuses on domain name. That makes it easier to set up connectivity into the cloud, as well as simplifies moves, adds and changes within the cloud service. This relieves admins from having to worry about all these IP mappings.<\/p>\n<p>As far as ease of use for end users, Pulse Connect Secure now has an on-demand per app VPN for Android devices. This eliminates the step of having to activate a VPN before opening an app. Now, the VPN automatically opens up when the user taps to open an app.<\/p>\n<p>These are just a few examples of the enhancements and new features that Pulse Secure has just introduced in its latest VPN product. The goal is to make life easier for both administrators and mobile end users in a hybrid IT environment.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id=\"\"\/>\n<div class=\"end-note\">\n<div id=\"\" class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3287046\/network-security\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nThe workplace is changing rapidly as employees embrace mobility, applications are in the cloud, and Internet of Things (IoT) devices are instrumented for continuous connectivity \u2014 and this is affecting how organizations must think about secure access. Regardless of the scenario, organizations want solutions that deliver better productivity for whomever (or whatever) is connecting, a consistent user experience, compliance with corporate policies and regulatory requirements, and strong end-to-end security.This is the playing field for Pulse Secure, a company that has built a broad portfolio of access products and services that are available as a unified platform. Pulse Secure has considered practically every use case and has built a range of solutions to solve the secure connectivity challenges that IT organizations face. The company claims to have more than 20,000 customers and a presence in 80 percent of global enterprises \u2014 maybe even yours.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":5110,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[812,1736,1061,307],"class_list":["post-5109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-data-center","tag-hybrid-cloud","tag-network-security","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pulse Secure VPN enhanced to better support hybrid IT environments 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pulse Secure VPN enhanced to better support hybrid IT environments 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-03T13:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Pulse Secure VPN enhanced to better support hybrid IT environments\",\"datePublished\":\"2018-07-03T13:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/\"},\"wordCount\":1250,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg\",\"keywords\":[\"Data Center\",\"Hybrid Cloud\",\"Network Security\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/\",\"name\":\"Pulse Secure VPN enhanced to better support hybrid IT environments 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg\",\"datePublished\":\"2018-07-03T13:40:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Center\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/data-center\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Pulse Secure VPN enhanced to better support hybrid IT environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pulse Secure VPN enhanced to better support hybrid IT environments 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/","og_locale":"en_US","og_type":"article","og_title":"Pulse Secure VPN enhanced to better support hybrid IT environments 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-03T13:40:00+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Pulse Secure VPN enhanced to better support hybrid IT environments","datePublished":"2018-07-03T13:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/"},"wordCount":1250,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg","keywords":["Data Center","Hybrid Cloud","Network Security","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/","url":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/","name":"Pulse Secure VPN enhanced to better support hybrid IT environments 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg","datePublished":"2018-07-03T13:40:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.jpg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Center","item":"https:\/\/www.threatshub.org\/blog\/tag\/data-center\/"},{"@type":"ListItem","position":3,"name":"Pulse Secure VPN enhanced to better support hybrid IT environments"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=5109"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5109\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/5110"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=5109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=5109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=5109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}