Pulse Secure, LLC- Experts & Thought Leaders
Latest Pulse Secure, LLC news & announcements
It is the end of the line for analogue phone systems, which can leave alarm companies hanging out to dry, trying to figure out if they need to replace costly alarm panels. With the impending shutdown of the analogue telephone network, alarm monitoring companies nationwide need to come up with a game plan. It is more important than ever for security companies to equip themselves with the knowledge of what new technology solutions are available in the marketplace, in order to help offset the costs of transitioning away from analogue. Technology transformation With the biggest transformation facing alarm companies being technological advances in communications, everyone can agree that the traditional analogue telephone network is on its way to a complete shutdown. Whenever a major technology, especially one with a long history of regulation, approaches the end of its life, being prepared and ready for the transition is the key to success. With any technological disruption comes major change, but alarm companies need to be able to adapt quickly to survive and thrive in the ever-changing world of technology. In the past, traditional phone lines used circuit switching technology delivered over a copper line to send the alarm and data communication signals to the alarm monitoring company. Over the last couple of decades, technology-specific services have been migrating to packet switching over the public Internet, in the form of Voice over Internet Protocol (VoIP). Voice over Internet Protocol (VoIP) VoIP is a telecommunication service that takes analogue audio signals and converts them into digital data VoIP is a telecommunication service that takes analogue audio signals and converts them into digital data that can be transmitted over standard internet connections. While this transition has provided the opportunity for tremendous cost savings and more reliable connections, VoIP protocols have been designed with voice service in mind. This means that traditional alarm panel and modem protocols are seen as no longer compatible with these technological improvements. These changes are sweeping across an array of industries including security installers, fire monitoring, field medical monitoring, and alarm monitoring. As the analogue network is growing closer to becoming obsolete, alarm companies are facing a myriad of challenges. The ever more rapid advancement and adaptation of new technologies has left a gap in legacy communication systems. Ethernet-based VoIP systems E1/T1 and analogue POTS lines are increasingly being replaced by Ethernet-based VoIP systems, leaving alarm companies left with modem-based technology that can no longer work within the new infrastructure. With most telephony connections moving to VoIP, it can be costly for alarm companies to replace existing modems and alarm panels. Most are looking for a simple solution to help make a seamless transition without having to change their entire infrastructure. Replacing existing analogue infrastructure Time is of the essence for alarm companies nationwide that rely heavily on equipment and endpoint devices that use modems to communicate. In most cases, these modems cannot be replaced due to the high costs associated with replacing the existing infrastructure. With new requirements for fire alarm control panels, the pressure is on them now more than ever to react quickly and find a cost-effective solution. With limited options out there, one company has done their due diligence and launched a revolutionary solution that offers a clear path forward for the industry. Voice, video, and fax and data communications VOCAL Technologies has been leading the way, since 1986, in the design of software and hardware solutions VOCAL Technologies has been leading the way, since 1986, in the design of software and hardware solutions, under licence for voice, video, and facsimile and data communications. The company develops and applies advanced technologies for superior voice, video, fax and data communications. With a broad range of innovative design solutions that yield the highest quality communications at a lowest cost and an insight into the technical challenges of the telecommunications industry, it was natural for them to develop a unique solution, in order to help navigate companies through the VoIP revolution. As the security industry continues to evolve and face many challenges with the move from analogue to VoIP phone lines, VOCAL Technologies knew it was the right time to develop a combined software and hardware solution. Their goal was to throw out a lifeline to help alarm companies transition easier and more efficiently. VOCAL SIP Analogue Modem Server With cloud-based modems now a firm reality, the VOCAL SIP Analogue Modem Server, or SAMS, is a unique IP-based software solution for inter-operating with legacy modems, without the need for modem banks with E1/T1 connections. This Virtual Modem Server allows a business to deploy a server in the Cloud, which can work with the modern VoIP phone network infrastructure based on SIP and RTP, instead of using T1/E1 lines to connect to the PSTN. Virtual Modem server The Virtual Modem server contains true soft modems and not just an AT command set on a TCP socket pretending to be a modem. This allows the server to connect to true voice band modems deployed on the PSTN, and thus, does not require installation of additional equipment on the far end of the security system. Alarm monitoring centres are not left out of these significant advancements in communication infrastructure. Supporting industry standard alarm protocols, including Ademco Contact-ID, Sonitrol, DC-03/FSK, Pulse, and SIA-2000, the modem server can also act as a virtual replacement for physical alarm receiver equipment. Modem over IP (MoIP) solution SAMS provides a true Modem over IP (MoIP) solution and can support a broad range of remote endpoints SAMS provides a true Modem over IP (MoIP) solution and can support a broad range of remote endpoints. Bringing in expertise from numerous industrial market sectors, such as Utility Metering, Point of Sale (PoS) payment processing, SCADA, Out of Band management, among others. SAMS is a perfect choice for alarm companies. Even when traditional ISDN and POTS lines remain available, Alarm Receiver and Remote Access Server (RAS) equipment like the AS5350 has reached end of life and these vital business systems are left in a state where failure is imminent and quick repair or replacement are no longer options. This can happen with servers interacting with alarm systems and security panels. M2M applications rely on data modems Countless M2M applications rely on data modems to accomplish their task and VOCAL has launched a few solutions to allow these applications to adapt to the changing infrastructure. VOCAL servers come in a variety of configurations, which cover the full range of ITU V-series modems, as well as many other industry standard modulations. This allows it to fit easily into existing systems and flexibly meet the needs of already deployed infrastructure and applications. VOCAL continues to customise all solutions for customers and can meet specific system requirements, when necessary. IP switchover When it comes to end-of-life modem products, VOCAL’s SAMS software is a great replacement solution for Cisco’s Access Servers (2500 series, AS5350), Cisco PVDM Digital Modem Modules (PVDM2-12DM, PVDM2-24DM, PVDM2-36DM), modem server banks, alarm receivers, and groups of individual hardware modems. VOCAL is helping alarm companies that are currently using ISDN for PSTN access to their modem servers as SIP-based VoIP will be the replacement for ISDN. The cost savings brought on by switching from expensive ISDN and analogue lines to VoIP has made the IP switchover a desirable transition instead of a painful requirement. Integration with SIP infrastructure Integrating the modem infrastructure and the SIP infrastructure has become more and more necessary Integrating the modem infrastructure and the SIP infrastructure has become more and more necessary. Ideally, running modems on the cloud server, connected to a SIP infrastructure would be the best scenario. Using a Cloud Modem Server, such as VOCAL’s SIP Analogue Modem Server (SAMS), allows alarm companies to get the benefits of the SIP infrastructure, without having to replace the legacy pieces of their alarm panels which can be costly. Remote modems The server can run in the data centre, where all of the company’s other network facing services reside, which can save money and facilitate changing business models that are moving away from physically located hardware and into remote virtual working environments. As the controlling application, the SAMS server is seen the same way as any other modem. The remote modems can call the SAMS server from the PSTN (or be called) as they always have. The SAMS server behaves as a bank of modems connected to ISDN would, all while running on off the shelf hardware or any standard virtualised environment. Analogue Modem Adapter (AMA) In addition to their software solution, VOCAL also introduced an Analogue Modem Adapter (AMA) to the marketplace, which is a device that enables analogue modems and alarm panels to securely transmit data over digital networks. The AMA connects legacy alarm, POS, voice, fax and other analogue devices to IP networks including mobile, radio, and satellite networks. This is a great option for alarm companies that have analogue and modem-based equipment but no longer have phone lines available and want a secure connection. Open line of communication An AMA provides a modular phone jack and an Ethernet port where an analogue device, such as a Digital Alarm Communicator Transmitter (DACT), can be connected to the modular jack to transmit directly over IP network. This eliminates the need for telephone landline connections. An AMA supports telephony features such as dial tone, device power, ringing and standard telephone signaling to communicate with the local modem. Combines with SAMS server installation VOCAL’s AMA software is part of a fully integrated and highly configurable VoIP software solution Combined with a SAMS server installation, VOCAL’s AMA creates a novel approach to bypassing the data and alarm protocol issues that are introduced by last mile IP connections and line emulation devices utilised in VoIP infrastructure. VOCAL’s AMA software is part of a fully integrated and highly configurable VoIP software solution with a network stack, SIP stack, secure communications, and full-featured telephony software with a comprehensive data modem software library. Making the VoIP transition VOCAL continues to work with alarm companies nationwide to help make the VoIP transition a smooth one with a combined hardware and software solution that is second to none. It is important for alarm companies to research the options available to them and continue educating themselves as the end of the line grows closer for analogue phone systems. In the past, the security industry has always been on the forefront of adopting new technologies and with VOCAL on their team, the paradigm shift to VoIP can take place seamlessly. By bringing together a combined software and hardware solution, VOCAL has taken a technical disruption and turned it into a graceful transition for alarm companies that will keep the lines of communication open now and well into the future.
More than half of organisations (52%) consider phishing attacks or ID and credential theft as the top concern in Q3 2020, according to data released by Pulse Secure (acquired by Ivanti), the renowned provider of Zero Trust Secure Access solutions, and CyberRisk Alliance, a business intelligence company. Additionally, more than one-third of respondents (38%) across all regions experienced unauthorised or improper resource, application or data access, with North American organisations (39%) significantly more likely than Europeans (26%) to have encountered related data exfiltration, anomalous or malicious traffic. Proactive security allocation The Cybersecurity Resource Allocation and Efficacy (CRAE) Index, created by CyberRisk Alliance (CRA) and underwritten by Pulse Secure, is a quarterly, time-series tracker that measures the overall focus and direction of North American and European organisations’ cyber security activities, spending, and perceived progress over time. Scores above 50 indicate a spending or efficacy increase and scores below 50 show a spending or efficacy decrease. Compared to the previous quarter, overall resource allocation and spending on IT security rose Compared to the previous quarter, overall resource allocation and spending on IT security rose (66.5 in Q2 compared to 66.7 in Q3). In contrast, overall efficacy dropped (75.8 in Q2 compared to 74.2 in Q3), indicating that the increased expenditure did not result in a higher perception of improved security results. In North America, spending remained flat between Q2 and Q3 (66.5), but with a greater allocation towards reactive versus proactive security allocation. Cyber security technology In contrast, the European CRAE Index showed an increase in quarterly spending and allocation (68.4 in Q3 compared to 66.5 in Q2) that focused on more proactive measures, with a similar reduction in efficacy (dipping to 74.4 Q3 from 74.9 Q2). The score was higher (by 1.9 points) for Europe than for North America, possibly propelled by organisations advancing the European Union’s General Data Protection Regulation (GDPR) safeguards. Healthcare experienced strong growth for cyber security resource and spending allocations globally Healthcare resource allocation and spending growth accelerated in Q3 by 5.8 points to an index score of 69.6 points. The expansion was driven by protection measures, which jumped 8.7 points to an index score of 75.2, including cyber security training and awareness programmes, developing processes to secure digital and physical assets, and purchasing or implementing cyber security technology. IoT security issues In terms of cyber security challenges, phishing and identity/credential theft were most impactful Additionally, the “Protecting” Efficacy Index rose by 7.6 points to 80.6, mostly driven by related protection efficacy, where healthcare organisations shared increased confidence in the effectiveness of their resource and investment allocations since Q2. Healthcare industry respondents highlighted budgetary constraints, a trend continuing from Q2, as their primary challenge to combat rising threats and address elevated risks from untrained staff and employee carelessness with highly sensitive data. In terms of cyber security challenges over the last quarter, phishing and identity/credential theft were most impactful for healthcare respondents (54%), with external compliance and audit events (33%), and endpoint malware and IoT security issues (32%) rounding out the top three. Security efficacy response Financial services and insurance industries concentrated on recovery Financial services resource allocation and spending dipped to 67.4 from 68.2 in Q2, along with efficacy that declined 3.2 points in the quarter (from a 77.3 to 74.1 index score). These changes in index levels indicate a slowdown in the spending growth and waning optimism in security effectiveness during Q3. The only efficacy component that increased was “Recovering,” which includes developing/executing recovery plans and procedures, coordinating communications during recovery activities, and implementing improvements based on lessons learned. Respondents cited an increase in security efficacy response, which jumped 2.9 points, suggesting increased growing optimism about recovery plans and future improvements. Data theft and corruption Manufacturing resource spending rose 1.2 points to 67.8, and efficacy rose 2.3 points to 75.1 quarter over quarter Challenges for this sector in Q3 included increased external threats, business disruption, data theft and corruption, leaks, and lack of new system innovations. Phishing was the top cyber security threat (59%), with web and cloud attacks (48%) and internal compliance and audit events (41%) rounding out the top three. Manufacturing showed increased confidence in new strategies and regulations Manufacturing resource spending rose 1.2 points to 67.8, and efficacy rose 2.3 points to 75.1 quarter over quarter. There was an above-average point increase of 3.8 in “Responding,” which indicates that firms are focused on developing response strategies, policies and controls to prevent future attacks. Risk management strategies The manufacturing industry’s 3.7-point increase in efficacy of “Identifying” is consistent with increased confidence in improved asset management plans, risk management strategies and governance programmes for this sector. Work from home requirements due to the pandemic impacted manufacturing firms, with many respondents indicating positive changes to improved security policies within their organisations. Even with such improvement, phishing and ID/credential theft was the top cyber security threat (52%), with internal compliance and audit events (45%) and endpoint and IoT threats (42%) rounding out the top three for manufacturing. Secure digital assets High tech and business services saw slower growth in every sub-index category High Tech and business services spending dropped 3.8 points to 64.1, as did efficacy by 7.3 points to 72.4. All five NIST components as relayed by survey respondents saw slower growth for spending allocation and efficacy in Q3, with the largest drop of 12.3 points occurring in efficacy for “Protecting,” which includes cyber security training/awareness, developing processes to secure digital and physical assets, and purchasing or implementing cyber security technology. Efficacy sentiment for four out of five activities also increased, although at a slower pace in Q3 Even though respondents noted increased attacks in number and scope, as well as increased sophistication and adaptability of adversaries, this industry sector saw slower growth in every sub-index category - indicating a softening resource expansion. Interestingly, phishing ranked as the lowest concern (42%), with endpoint malware and IoT security (46%), web or cloud application attacks (45%), and insider threats and anomalous users (44%) rounding out the top three. Other findings The accompanying CRAE report noted that: “Overall, three out of five NIST sub-index component index readings (“Identifying,” “Protecting,” and “Recovering”) rose in Q3 as organisations reported increased resource and spending allocations for proactive cyber security approaches, such as process improvements, system and software upgrades, and increased employee awareness and training. Efficacy sentiment for four out of five activities also increased, although at a slower pace in Q3. “Recovering” efficacy expanded slightly faster on average, reflecting increased confidence of respondents about their initiatives to recover from information security events and breaches. Information security leaders “This is a useful piece of cyber security research that gives IT and information security leaders directional insight into what is happening on the ground from a peer and industry perspective,” said Mike Riemer, Chief Security Architect at Ivanti. “The findings highlight that organisations are furthering security investments in proactive technologies to address expanded threats due to increased remote workplace requirements, and that security practitioners need to further their focus on optimising processes and controls to turn the tide of efficacy confidence.”
Pulse Secure, the globally renowned provider of Zero Trust Secure Access solutions, has announced that the COVID-19 pandemic has not impacted the adoption of Zero Trust technology globally. In fact, nearly two thirds of organisations (60%) said that they have accelerated Zero Trust implementation during the pandemic, according to the ‘Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation’. Enterprise Zero Trust Networking Strategies The’ Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation’, conducted by Enterprise Management Associates (EMA) and sponsored by Pulse Secure, surveyed more than 250 technology professionals. The report examines how enterprises are moving forward with Zero Trust networking initiatives The newly published report examines how enterprises are moving forward with Zero Trust networking initiatives, where they’re being successful in doing so, and how COVID-19 has affected the forward movement of those projects. Accelerating Zero Trust initiatives The research found that the main difference between those who were successful in moving their Zero Trust initiatives forward were those that started out with formalised Zero Trust projects. Those that had dedicated budgets and formal initiatives - (69%) were far more likely to continue accelerating those projects throughout the pandemic, while those that had ad hoc Zero Trust projects were more likely to stall progress or stop entirely. Increased leverage of cloud resources and applications “The global pandemic has had some profound effects on the enterprise with remote working being rolled out on an unprecedented scale, increased leverage of cloud resources and applications, and the transition to greater workplace flexibility,” said Scott Gordon, Chief Marketing Officer at Pulse Secure. Scott adds, “The findings indicate that organisations that advance their initiatives and planning towards Zero Trust process and technology implementation will be ahead of the digital transformation curve and much more resilient to threats and crises.” Bringing Zero Trust Networking into enterprise environments Enterprises were overwhelmingly positive about their success in pursuing Zero Trust Networking The research survey went further into enterprises’ efforts to bring about Zero Trust Networking in their environments. More than four out of five respondents (85%) have defined Zero Trust initiatives. However, less than half of the enterprises (42%) have received added budget for their projects. The Zero Trust projects that did receive added budget were more likely to persist through the COVID-19 pandemic period. Enterprises were overwhelmingly positive about their success in pursuing Zero Trust Networking, with the majority (94%) indicating degrees of success, half (50%) labeled their efforts as successful and less than half (44%) of respondents indicating somewhat successful. Combining security and networking teams Dedicated Zero Trust projects tend to be interdisciplinary, bringing together security and networking teams. In 45% of such projects, security and networking teams have a Zero Trust partnership in which they formally share tools and processes. In half of the cases (50%), enterprises created a taskforce from both teams to pursue Zero Trust. The three primary ways in which they collaborated were by coordinating access security controls across different systems (48%), assessing access security control requirements (41%) and defining access requirements according to user, role, data and application (40%). Issues with Zero Trust taskforces and partnerships However, the survey found that collaboration is not without its own roadblocks. 85% of respondents in Zero Trust taskforces and partnerships found themselves struggling with cross-team skills gaps (33%), a lack of tools and processes that might facilitate collaboration (31%), and budget conflicts (31%). Enterprises are clearly accelerating efforts to adopt Zero Trust networking initiatives" “Enterprises are clearly accelerating efforts to adopt Zero Trust networking initiatives. The survey shows that organisations that move forward with formal initiatives and budget are more likely to achieve implementation success and operational gain,” said Shamus McGillicuddy, Vice President of Research at Enterprise Management Associates. Shamus adds, “We appreciate Pulse Secure’s support and sponsorship of this report that organisations can use to benchmark and progress their Zero Trust programs.” Additional key findings include: Prime Zero Trust Benefits: When asked what they consider to be the prime benefit of Zero Trust networks, respondents said IT operations agility (40%), improved governance risk and compliance (35%), breach prevention (34%), reducing the attack surface (31%) and unauthorised access mitigation (28%) ranked among the strongest responses. Hybrid IT Remote Access: Respondents are applying hybrid IT requirement to Secure Remote Access requirements within their Zero Trust Network Strategy, while the majority (62%) of the enterprises wanted cloud application access, half of enterprises access to public and private cloud resources and applications. IoT Device Exposures: Respondents discussed their position towards IoT devices which cannot be provided with the user identities on which Zero Trust is based and how they intend to create access policies for them. Over a third (36%) said that devices would receive tailored access privileges based on function and characteristics, others said that all devices would receive a generic minimum level of access privileges (28%) and that untrusted devices would have limited network access with no access to high risk or compliance zones (23%). Research survey details The’ Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation’ research surveyed 252 technology professionals, including executive IT leadership executives (43%) and security managers (33%). The majority (54%) of the respondents worked in large enterprises that spanned multiple industries, with a concentration from professional services, manufacturers, software, retail sector and financial services. The research survey had a majority (63%) of organisations based in North America, with over a third (37%) spread across Europe, primarily in the countries of France, Germany, and the United Kingdom.
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
Download