SlideShare a Scribd company logo
1 of 8
Download to read offline
TRANSFORMING
ENTERPRISE
PRODUCTIVITY
WITH HYBRID IT
A look into the mixed environment of mobile, cloud and data center
WWW.PULSESECURE.NET
Introduction
The New Three-Legged Stool
Managing The Security Risk
Leveraging the Cloud and Datacenter
The New Mobile Platform
Secure Access is Key
Embracing The CASB Model for Hybrid IT
Conclusion
Table of Contents
4
5
6
7
8
10
12
13
PULSE SECURE PARTNERED
WITH RENOWNED IT SECURITY
WRITER JIM ROMEO TO EXPLORE
THE TOPIC OF HYBRID IT
AND THE IMPACT IT HAS ON
ORGANIZATIONS.
THE RISE OF HYBRID IT
www.pulsesecure.net 32 Transforming Enterprise Productivity with Hybrid IT
Mobile devices proliferate. So do applications. Cloud
computing is robust and growing. Organic databases
and applications residing at the IT datacenter have and
will likely always be accessed and utilized. All these
venues make up a Hybrid IT platform - or “three-legged
stool” for today’s knowledge worker to rest and rely on
for improved productivity.
workers rely greatly on smartphones and tablets to access
sensitive data that may be in the cloud or datacenter.
At present, there are more mobile devices than people
on this planet; the number of devices entering the world
Mobile users are now surpassing desktop users and over
80% of their usage is via applications. Applications are
growing and improving to enable access of all types and
are used to access the cloud.
The second leg of the stool is the cloud. Cloud computing
Companies are spending about $13 billion per year on
it. Over 80% of companies say they are saving money by
moving operations to the cloud and over half of company
workloads are now conducted in the cloud.
The third leg is the existing silos of data, information
and applications that are home-based in the traditional
IT enterprise; they reside on company turf and have
never migrated elsewhere. The cloud, in conjunction with
devices, is used with legacy databases and home-based IT
infrastructure to perform many business functions. This
entire model has already been widely adopted and is likely
to continue in popularity and utility in the years to come.
“IT organizations are taking an ‘adopt and go’ strategy
to satisfy internal customer IT consumerization and
democratization requirements,” according to Chris
Howard, Vice President and Chief of Research at Gartner.
The success of Hybrid IT relies on a new robust security
perimeter with policy at its core; it makes the three-
legged stool strong and secure. This includes compliance,
authentication and a secure gateway to and from dispersed
endpoints.Withtherighttoolsandtechnology,theknowledge
worker of today and tomorrow will be most productive with
all the information that abounds in the public and private
cloud as well as their corporate network.
The New Three-Legged Stool of Today’s (and Tomorrow’s)
Knowledge Worker: Mobility, Cloud Computing and the
Traditional IT Enterprise
In case you didn’t get the message, Hybrid IT has arrived.
We are living in a new business environment where
mobile devices connect to cloud computing and legacy IT
infrastructure.
in today’s global IT environment, includes the use of cloud-
based applications and data with organic applications and
databases found in-house.
applications, as well as cloud and data services. When cloud
computing is combined with mobile assets and organic
corporate databases and applications, workers enjoy great
With Hybrid IT, workloads move between internal and
external IT infrastructures. This complementary relationship
where they work, what data they use, and when and how
they access that data to perform a task. Hybrid IT allows
them to do things they couldn’t do just a few short years ago.
Having said all of that, Hybrid IT has its challenges. Security
risks from a distributed workforce and a growing population
ofmobiledevicesandapps,presentconcernsfortoday’sChief
rises to meet demands and challenges of Hybrid IT is crucial.
Secure access to Hybrid IT when managed appropriately,
can positively transform enterprise IT.
“Hybrid IT is the new IT and is here to stay,” says Chris
Howard, Vice President and Chief of Research at Gartner.
“While the cloud market matures, IT organizations must
adopt a hybrid IT strategy that not only builds internal clouds
to house critical IT services and compete with public CSPs
to house non-critical IT services and data, augment internal
capacity, and increase IT agility. Hybrid IT creates symmetry
between internal and external IT services that will force an IT
and business paradigm shift for years to come.”
IT leaders must monitor this business paradigm shift in the
years ahead and embrace the change in order to harness its
full potential.
INTRODUCTION
Will Hybrid IT be the New Game Changer for Enterprises?
“Many IT organizations are adopting public cloud
computing for non-critical IT services such as
development and test applications, or for turnkey
software as a service (SaaS) applications such
as Web analytics and CRM that can holistically
replace internal applications and enable access
for a mobile workforce.”
54 www.pulsesecure.netTransforming Enterprise Productivity with Hybrid IT
Major IT security breaches dot the landscape of today’s
engaged knowledge worker. Hardly a day goes by
without another major breach making international
that in spite of their spending and investing, hackers get
in and steal sensitive data. Every IT leader knows the
chain somewhere. Damage from a security breach can be
devastating and detrimental.
This threat raises concern for security risk in a Hybrid IT
environment as data is accessed from anywhere, at any
time, operating in a Hybrid IT model sends a signal to CIOs
The prevalence of multiple points of entry poses additional
security risk. Mobile device access and asset management
pose risk and must be controlled. The apps they use are
also a source of breach. While CISOs have worked hard
to build security to bolster against such risk and intrusion,
the pathways followed in a Hybrid IT environment demand
more. As the popularity of Hybrid IT grows, its adoption
and success depends on the management of security risk
to enable its success.
MANAGINGTHESECURITYRISK
Securtiy: The Challenge to a Fully Functional
Hybrid IT Environment
derivatives exchange processes 3 billion contracts that are
worth approximately $1 quadrillion annually. Thousands
of worldwide users engage with their electronic trading
The exchange has implemented Identity-as-a-Service
laptop users scattered about the globe. The IdaaS enables
for access to the cloud and datacenter applications.
The exchange experienced problems with the user
experience for logins to the IdaaS and VPN gateway.
Because of the sensitive nature of the data and the global
security access was required. This, however, required
multiple logins. Users however found that multiple logins
is cumbersome since they require swift access to data
and the real-time operations of the exchange. In addition,
device compliance had relaxed. A robust approach to
device compliance enforcement was needed that also
enabled expedited sign-on for user access.
They exchanged implement a smarter solution with secure
their existing VPN. This allowed users to log in once and then
have access to data center and cloud applications. It also
enabled uniformed device compliance enforcement through
VPN host checking. Thus it reinstated required enforcement
of device compliance that had previously fallen.
Expediting identity and access at a world renowned
IT security faced and a swift response with the right security
tools and solutions. By acting on this, traders and investors
who access the cloud and data centers at the exchange
are able to be very productive from around the world in
a secure environment without losing the user experience.
Leveraging the Cloud and Datacenter
At A Major Financial Exchange
HYBRID
PUBLICPRIVATE
76 Transforming Enterprise Productivity with Hybrid IT www.pulsesecure.net
There are about 7.22 billion mobile devices in the world;
there are about 7.19 billion people on the planet. Research
from GSMA intelligence who tracks data on mobile
times faster than the population. About half the world’s
population subscribes to a mobile service of some kind.
This is because mobile devices are useful for everyday
life. Through a myriad of available apps, they allow
software applications – all in the cloud. Workers now
want the same utility from their employers letting them
access their corporate email and applications with their
personal mobile devices via Bring Your Own Device
same agility they have in their personal lives.
But it is important that enterprise information be managed
and controlled as secure mobile device containers that
allow, through appropriate software and applications,
a separation of personal business data. Mobile devices
must be compliant with existing security policies. Risk is
inherent with personal devices – Gartner found that one
in four business users surveyed admitted to having a
security issue on their private device in 2013.
In addition, apps on mobile phones are numerous and
enable entry into cloud applications. From a device, a
worker can be logged in and working from anywhere
and anytime. But apps must also be secure. The very
is also a source of intrusion. According to Pulse Secure’s
2014 Mobile Threat Report which researched some 2.5
million mobile applications, there were nearly one million
increase from 2013 alone.
Traceability and control of devices further challenge CISOs
in maintaining a secure perimeter. Identity and Access
mobile devices, has become the new IT perimeter.
“Authenticating users on a variety of endpoints should
provide the right balance of user experience, security and
workforce productivity,” according to Gartner’s research
report Refresh Authentication Choices to Improve Mobile
leaders need to keep pace with new methods of remote
access for the mobile workforce in a constantly changing
work environment.
THE NEW MOBILE PLATFORM
Mobile device access is essential for productivity but
security must continue to be a priority.
Securing this perimeter in real time as utilization grows is the challenge
with device compliance is the new objective for CISOs in a Hybrid IT
environment. Such identities represent their new IT security perimeter.
www.pulsesecure.net 98 Transforming Enterprise Productivity with Hybrid IT
Challenging the Security of Hybrid IT
When mobile workers utilize BYOD to access sensitive
corporate data, there is a risk of non-compliance and
exposure of sensitive data to unwanted parties.
SaaS is very useful for today’s business entity. However,
such platforms pose security risk. 53% of respondents
in KPGM’s 2014 Cloud Survey Report cited “data loss and
privacy risk” as the greatest concern when adopting the cloud.
Sensitive corporate information will reside into the cloud
Salesforce and Concur. This data may become a target
for artful hackers to use their tricks and methods to
and through the cloud.
Secure the Tunnel To the Cloud
and the Datacenter
Getting a grip on securing the pathways between devices
and data, involves securing the tunnel between them. The
clincher for IT leadership is to allow secure access and
insure the tunnel is protected and controlled.
How does this happen?
Principally, by implementing authorization access control
services for employees and users – from any device,
anywhere, at any time, it happens. This means using
existing Secure Sockets Layer virtual private network
SECURE ACCESS IS KEY
Enterprises require a secure tunnel to the cloud
and data center
53%
a secure pathway between users and the cloud provider.
Enforcing device compliance is key in both cases to protect
the integrity of enterprise data. Such tools insure the
tunnel of Hybrid IT use is not only accessible, but secure.
Secure the Data not the Device
Building a gateway is part of meeting the security challenge
of Hybrid IT. Because workers take advantage of the BYOD
approach,andmanagingtheaccessandauthenticationoftheir
device must be a critical component of any security strategy.
This requires the use of a device container, so workers can
utilize BYOD securely and peacefully coexist with personal
and corporate applications on their device. The container
eliminates the enterprise need to manage the entire
device and protects worker privacy.
Securing the tunnel using identity management tools and
technology, and ultimately securing the device container,
to collaborate and work together globally in a secure
environment – with any device accessing information in
the datacenter or in the cloud, wheneverand wherever
they choose.
Location, location, location – it really doesn’t matter
anymore. Because users work anywhere, at any time,
and are much more productive. Thanks to advances in
technology, this productivity gain is possible, even though
evolving security risk continuously challenges it.
Secure the tunnels to the datacenter and the cloud, enable
workers to use any secured device – be it their own or not,
and you have the ingredients for a very productive and
secure work environment. Insuring remote and mobile
security should encompass multilayered access that is
right solutions and tools, expediting access will also aid in
making Hybrid IT the productive platform that it is.
Today’s worker is able to do things they could not do
before – simply because secure access technology allows
them to do it. And they can produce not just from their
from anywhere in the world.
This is a game changer.
www.pulsesecure.net 1110 Transforming Enterprise Productivity with Hybrid IT
A CASB model is ideal to enable Hybrid IT. It allows access
to numerous common cloud-based SaaS applications via
mobile devices and use cloud applications and corporate
data parked in legacy databases and servers at their
parent company. It is a value-added approach.
However, proceed with caution.
Its full embrace must honestly ask and answer some
key questions before taking this route. Here are seven
questions to consider to accelerate its success:
1.What skill sets and IT competencies will be required
to maintain this model once in place? There are new
apps, new IT silos, and perhaps several new ways of doing
business. Is everyone ready and trained to embrace them
and work with a CASB model?
2. What about Scalability? What will we face when it’s
the CASB model ready and able to scale with it?
3. How will we manage increasing operational
complexity as new technology and new approaches
come about and are required to compete? Everyday
a new wave of technology arrives. Often this adds to
operational complexity. So how will this all be incorporated
and anticipated with CASB?
4. What about extending existing services and apps?
services with devices and apps. Focus on swiftly making
them available and integrate this with CASB.
5. What is our plan for compliance enforcement?
A dispersed workforce with multiple devices presents
compliance risk. Will device compliance and enforcement
be incorporated into your CASB model so that it does not
fall wayward?
6. How much can we rely on CASB? Will CASB’s proxy
technology – sitting right smack dab in the data path,
deliver the service we demand and require? How reliable
is it and will it interfere at all with data access?
7. Will this all be transparent to the user experience
once CASB is in place? Users want easy access to data – be
it from the datacenter or the cloud; they do not want to sign
on several times and even get kicked out, only to have to
start over. Will this happen? It shouldn’t. Insure transparency
is part of initial planning, but ongoing plans as well.
embrace may be overcome. However, such questions need
to be on the table when partnering with a CASB solutions
provider. Retooling your network and providing users
trusted seamless access to your datacenter and the cloud
is a wonderful advanced strategy.
Take time upfront to answer important questions and
stimulate discussion so that CASB yields the true dividends
and ROI you expect and ultimately avoid any pitfalls.
Embracing The Cloud Access Security Broker (CASB)
Model for Hybrid IT: Seven Key Questions You Need
To Ask and Answer To Avoid Common Pitfalls
As mobile device ownership and usage grows and
applications. Enterprises must adapt their compliance,
authorization and access security solutions to provide
multi-layered protection without making application and
information cumbersome to the user.
CISOs are challenged to make Hybrid IT safe and secure
by meeting all the challenges that it poses. Namely, they
must authenticate user and device identity and through
cutting-edge identity management tools and solutions,
provide a safe tunnel by which applications in the cloud and
on their very own premises may be accessed and utilized.
employee productivity and the entire organization.
About Pulse Secure
Pulse Secure, LLC is a leading provider of access and
mobile security solutions to both enterprises and service
providers. Enterprises from every vertical and of all sizes
network access control and mobile security products to
enable end user mobility securely and seamlessly in their
organizations. Pulse Secure’s mission is to enable open,
integrated enterprise system solutions that empower
business productivity through seamless mobility.
About the Author
Jim Romeo is a freelance copywriter, workshop and
seminar leader, speaker, coach, and author, with a focus
on business and technology topics. He has written more
than 800 feature articles on a wide array of topics, including
IT, IT security, engineering design, marketing, supply chain
management, telecommunications, emerging technologies,
and leadership and professional development. His
writing credits include Desktop Engineering, The Maritime
Executive, SC Magazine and many more. He has a
background in engineering and holds an MBA in marketing
from Columbia University in New York.
Copyright 2015 Pulse Secure, LLC. All rights reserved. Pulse Secure and the Pulse Secure logo are registered trademarks or Pulse Secure, LLC. All trademarks, service marks, registered
marks, or registered service marks are the property of their respective owners. Pulse Secure assumes no responsibility for any inaccuracies in this document. Pulse Secure reserves
the right to change, modify, transfer, or otherwise revise this publication without notice.
CONCLUSION
With Robust Security Measures, Hybrid IT Flourishes
1312 www.pulsesecure.netTransforming Enterprise Productivity with Hybrid IT
Pulse Secure LLC
2700 Zanker Rd. Suite 200
San Jose, CA 95134
www.pulsesecure.net

More Related Content

What's hot

New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
IoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationIoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationAhmed Banafa
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerData Con LA
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepapergenasun
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoTW. David Stephenson
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Mychal McCabe
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 

What's hot (19)

New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationIoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital Transformation
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoT
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 

Similar to TRANSFORMING PRODUCTIVITY WITH HYBRID IT

Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e bookPablo Junco
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Cygnet Infotech
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Hemang Rindani
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021VARINDIA
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edgeDImension Data
 
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfTop Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfinfosec train
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudLockheed Martin
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 

Similar to TRANSFORMING PRODUCTIVITY WITH HYBRID IT (20)

Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?
 
Trends in IoT 2017
Trends in IoT 2017Trends in IoT 2017
Trends in IoT 2017
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edge
 
Insights Success 20 Most Valuable IT Service Companies
Insights Success  20 Most Valuable IT Service CompaniesInsights Success  20 Most Valuable IT Service Companies
Insights Success 20 Most Valuable IT Service Companies
 
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfTop Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Experts
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 

More from Jim Romeo

Jim romeo b2 b copywriter - how long should blogs be
Jim romeo   b2 b copywriter - how long should blogs beJim romeo   b2 b copywriter - how long should blogs be
Jim romeo b2 b copywriter - how long should blogs beJim Romeo
 
Jim Romeo - B2B Copywriter - Supply Chain, Logistics, Software, High-Tech
Jim Romeo - B2B Copywriter - Supply Chain, Logistics, Software, High-TechJim Romeo - B2B Copywriter - Supply Chain, Logistics, Software, High-Tech
Jim Romeo - B2B Copywriter - Supply Chain, Logistics, Software, High-TechJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
IN-N-OUT BURGER
IN-N-OUT BURGERIN-N-OUT BURGER
IN-N-OUT BURGERJim Romeo
 
Chemical Industry in China
Chemical Industry in ChinaChemical Industry in China
Chemical Industry in ChinaJim Romeo
 
Automotive Logistics Magazine - The Automotive South -Working II
Automotive Logistics Magazine - The Automotive South  -Working IIAutomotive Logistics Magazine - The Automotive South  -Working II
Automotive Logistics Magazine - The Automotive South -Working IIJim Romeo
 
2_24551_Virtualization_SC_0113
2_24551_Virtualization_SC_01132_24551_Virtualization_SC_0113
2_24551_Virtualization_SC_0113Jim Romeo
 
Counterculture Linux Article
Counterculture Linux ArticleCounterculture Linux Article
Counterculture Linux ArticleJim Romeo
 
Maritime Executive_Out of Gauge CArgo
Maritime Executive_Out of Gauge CArgoMaritime Executive_Out of Gauge CArgo
Maritime Executive_Out of Gauge CArgoJim Romeo
 
Maritime Executive_HMorrison
Maritime Executive_HMorrisonMaritime Executive_HMorrison
Maritime Executive_HMorrisonJim Romeo
 
Cistera Networks Q and A
Cistera Networks Q and ACistera Networks Q and A
Cistera Networks Q and AJim Romeo
 
FUEL-cleanEnergy
FUEL-cleanEnergyFUEL-cleanEnergy
FUEL-cleanEnergyJim Romeo
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
Dell_whitepaper[1]
Dell_whitepaper[1]Dell_whitepaper[1]
Dell_whitepaper[1]Jim Romeo
 

More from Jim Romeo (15)

Jim romeo b2 b copywriter - how long should blogs be
Jim romeo   b2 b copywriter - how long should blogs beJim romeo   b2 b copywriter - how long should blogs be
Jim romeo b2 b copywriter - how long should blogs be
 
Jim Romeo - B2B Copywriter - Supply Chain, Logistics, Software, High-Tech
Jim Romeo - B2B Copywriter - Supply Chain, Logistics, Software, High-TechJim Romeo - B2B Copywriter - Supply Chain, Logistics, Software, High-Tech
Jim Romeo - B2B Copywriter - Supply Chain, Logistics, Software, High-Tech
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
IN-N-OUT BURGER
IN-N-OUT BURGERIN-N-OUT BURGER
IN-N-OUT BURGER
 
Chemical Industry in China
Chemical Industry in ChinaChemical Industry in China
Chemical Industry in China
 
Automotive Logistics Magazine - The Automotive South -Working II
Automotive Logistics Magazine - The Automotive South  -Working IIAutomotive Logistics Magazine - The Automotive South  -Working II
Automotive Logistics Magazine - The Automotive South -Working II
 
2_24551_Virtualization_SC_0113
2_24551_Virtualization_SC_01132_24551_Virtualization_SC_0113
2_24551_Virtualization_SC_0113
 
Counterculture Linux Article
Counterculture Linux ArticleCounterculture Linux Article
Counterculture Linux Article
 
Maritime Executive_Out of Gauge CArgo
Maritime Executive_Out of Gauge CArgoMaritime Executive_Out of Gauge CArgo
Maritime Executive_Out of Gauge CArgo
 
Maritime Executive_HMorrison
Maritime Executive_HMorrisonMaritime Executive_HMorrison
Maritime Executive_HMorrison
 
Cistera Networks Q and A
Cistera Networks Q and ACistera Networks Q and A
Cistera Networks Q and A
 
FUEL-cleanEnergy
FUEL-cleanEnergyFUEL-cleanEnergy
FUEL-cleanEnergy
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
Dell_whitepaper[1]
Dell_whitepaper[1]Dell_whitepaper[1]
Dell_whitepaper[1]
 

TRANSFORMING PRODUCTIVITY WITH HYBRID IT

  • 1. TRANSFORMING ENTERPRISE PRODUCTIVITY WITH HYBRID IT A look into the mixed environment of mobile, cloud and data center WWW.PULSESECURE.NET
  • 2. Introduction The New Three-Legged Stool Managing The Security Risk Leveraging the Cloud and Datacenter The New Mobile Platform Secure Access is Key Embracing The CASB Model for Hybrid IT Conclusion Table of Contents 4 5 6 7 8 10 12 13 PULSE SECURE PARTNERED WITH RENOWNED IT SECURITY WRITER JIM ROMEO TO EXPLORE THE TOPIC OF HYBRID IT AND THE IMPACT IT HAS ON ORGANIZATIONS. THE RISE OF HYBRID IT www.pulsesecure.net 32 Transforming Enterprise Productivity with Hybrid IT
  • 3. Mobile devices proliferate. So do applications. Cloud computing is robust and growing. Organic databases and applications residing at the IT datacenter have and will likely always be accessed and utilized. All these venues make up a Hybrid IT platform - or “three-legged stool” for today’s knowledge worker to rest and rely on for improved productivity. workers rely greatly on smartphones and tablets to access sensitive data that may be in the cloud or datacenter. At present, there are more mobile devices than people on this planet; the number of devices entering the world Mobile users are now surpassing desktop users and over 80% of their usage is via applications. Applications are growing and improving to enable access of all types and are used to access the cloud. The second leg of the stool is the cloud. Cloud computing Companies are spending about $13 billion per year on it. Over 80% of companies say they are saving money by moving operations to the cloud and over half of company workloads are now conducted in the cloud. The third leg is the existing silos of data, information and applications that are home-based in the traditional IT enterprise; they reside on company turf and have never migrated elsewhere. The cloud, in conjunction with devices, is used with legacy databases and home-based IT infrastructure to perform many business functions. This entire model has already been widely adopted and is likely to continue in popularity and utility in the years to come. “IT organizations are taking an ‘adopt and go’ strategy to satisfy internal customer IT consumerization and democratization requirements,” according to Chris Howard, Vice President and Chief of Research at Gartner. The success of Hybrid IT relies on a new robust security perimeter with policy at its core; it makes the three- legged stool strong and secure. This includes compliance, authentication and a secure gateway to and from dispersed endpoints.Withtherighttoolsandtechnology,theknowledge worker of today and tomorrow will be most productive with all the information that abounds in the public and private cloud as well as their corporate network. The New Three-Legged Stool of Today’s (and Tomorrow’s) Knowledge Worker: Mobility, Cloud Computing and the Traditional IT Enterprise In case you didn’t get the message, Hybrid IT has arrived. We are living in a new business environment where mobile devices connect to cloud computing and legacy IT infrastructure. in today’s global IT environment, includes the use of cloud- based applications and data with organic applications and databases found in-house. applications, as well as cloud and data services. When cloud computing is combined with mobile assets and organic corporate databases and applications, workers enjoy great With Hybrid IT, workloads move between internal and external IT infrastructures. This complementary relationship where they work, what data they use, and when and how they access that data to perform a task. Hybrid IT allows them to do things they couldn’t do just a few short years ago. Having said all of that, Hybrid IT has its challenges. Security risks from a distributed workforce and a growing population ofmobiledevicesandapps,presentconcernsfortoday’sChief rises to meet demands and challenges of Hybrid IT is crucial. Secure access to Hybrid IT when managed appropriately, can positively transform enterprise IT. “Hybrid IT is the new IT and is here to stay,” says Chris Howard, Vice President and Chief of Research at Gartner. “While the cloud market matures, IT organizations must adopt a hybrid IT strategy that not only builds internal clouds to house critical IT services and compete with public CSPs to house non-critical IT services and data, augment internal capacity, and increase IT agility. Hybrid IT creates symmetry between internal and external IT services that will force an IT and business paradigm shift for years to come.” IT leaders must monitor this business paradigm shift in the years ahead and embrace the change in order to harness its full potential. INTRODUCTION Will Hybrid IT be the New Game Changer for Enterprises? “Many IT organizations are adopting public cloud computing for non-critical IT services such as development and test applications, or for turnkey software as a service (SaaS) applications such as Web analytics and CRM that can holistically replace internal applications and enable access for a mobile workforce.” 54 www.pulsesecure.netTransforming Enterprise Productivity with Hybrid IT
  • 4. Major IT security breaches dot the landscape of today’s engaged knowledge worker. Hardly a day goes by without another major breach making international that in spite of their spending and investing, hackers get in and steal sensitive data. Every IT leader knows the chain somewhere. Damage from a security breach can be devastating and detrimental. This threat raises concern for security risk in a Hybrid IT environment as data is accessed from anywhere, at any time, operating in a Hybrid IT model sends a signal to CIOs The prevalence of multiple points of entry poses additional security risk. Mobile device access and asset management pose risk and must be controlled. The apps they use are also a source of breach. While CISOs have worked hard to build security to bolster against such risk and intrusion, the pathways followed in a Hybrid IT environment demand more. As the popularity of Hybrid IT grows, its adoption and success depends on the management of security risk to enable its success. MANAGINGTHESECURITYRISK Securtiy: The Challenge to a Fully Functional Hybrid IT Environment derivatives exchange processes 3 billion contracts that are worth approximately $1 quadrillion annually. Thousands of worldwide users engage with their electronic trading The exchange has implemented Identity-as-a-Service laptop users scattered about the globe. The IdaaS enables for access to the cloud and datacenter applications. The exchange experienced problems with the user experience for logins to the IdaaS and VPN gateway. Because of the sensitive nature of the data and the global security access was required. This, however, required multiple logins. Users however found that multiple logins is cumbersome since they require swift access to data and the real-time operations of the exchange. In addition, device compliance had relaxed. A robust approach to device compliance enforcement was needed that also enabled expedited sign-on for user access. They exchanged implement a smarter solution with secure their existing VPN. This allowed users to log in once and then have access to data center and cloud applications. It also enabled uniformed device compliance enforcement through VPN host checking. Thus it reinstated required enforcement of device compliance that had previously fallen. Expediting identity and access at a world renowned IT security faced and a swift response with the right security tools and solutions. By acting on this, traders and investors who access the cloud and data centers at the exchange are able to be very productive from around the world in a secure environment without losing the user experience. Leveraging the Cloud and Datacenter At A Major Financial Exchange HYBRID PUBLICPRIVATE 76 Transforming Enterprise Productivity with Hybrid IT www.pulsesecure.net
  • 5. There are about 7.22 billion mobile devices in the world; there are about 7.19 billion people on the planet. Research from GSMA intelligence who tracks data on mobile times faster than the population. About half the world’s population subscribes to a mobile service of some kind. This is because mobile devices are useful for everyday life. Through a myriad of available apps, they allow software applications – all in the cloud. Workers now want the same utility from their employers letting them access their corporate email and applications with their personal mobile devices via Bring Your Own Device same agility they have in their personal lives. But it is important that enterprise information be managed and controlled as secure mobile device containers that allow, through appropriate software and applications, a separation of personal business data. Mobile devices must be compliant with existing security policies. Risk is inherent with personal devices – Gartner found that one in four business users surveyed admitted to having a security issue on their private device in 2013. In addition, apps on mobile phones are numerous and enable entry into cloud applications. From a device, a worker can be logged in and working from anywhere and anytime. But apps must also be secure. The very is also a source of intrusion. According to Pulse Secure’s 2014 Mobile Threat Report which researched some 2.5 million mobile applications, there were nearly one million increase from 2013 alone. Traceability and control of devices further challenge CISOs in maintaining a secure perimeter. Identity and Access mobile devices, has become the new IT perimeter. “Authenticating users on a variety of endpoints should provide the right balance of user experience, security and workforce productivity,” according to Gartner’s research report Refresh Authentication Choices to Improve Mobile leaders need to keep pace with new methods of remote access for the mobile workforce in a constantly changing work environment. THE NEW MOBILE PLATFORM Mobile device access is essential for productivity but security must continue to be a priority. Securing this perimeter in real time as utilization grows is the challenge with device compliance is the new objective for CISOs in a Hybrid IT environment. Such identities represent their new IT security perimeter. www.pulsesecure.net 98 Transforming Enterprise Productivity with Hybrid IT
  • 6. Challenging the Security of Hybrid IT When mobile workers utilize BYOD to access sensitive corporate data, there is a risk of non-compliance and exposure of sensitive data to unwanted parties. SaaS is very useful for today’s business entity. However, such platforms pose security risk. 53% of respondents in KPGM’s 2014 Cloud Survey Report cited “data loss and privacy risk” as the greatest concern when adopting the cloud. Sensitive corporate information will reside into the cloud Salesforce and Concur. This data may become a target for artful hackers to use their tricks and methods to and through the cloud. Secure the Tunnel To the Cloud and the Datacenter Getting a grip on securing the pathways between devices and data, involves securing the tunnel between them. The clincher for IT leadership is to allow secure access and insure the tunnel is protected and controlled. How does this happen? Principally, by implementing authorization access control services for employees and users – from any device, anywhere, at any time, it happens. This means using existing Secure Sockets Layer virtual private network SECURE ACCESS IS KEY Enterprises require a secure tunnel to the cloud and data center 53% a secure pathway between users and the cloud provider. Enforcing device compliance is key in both cases to protect the integrity of enterprise data. Such tools insure the tunnel of Hybrid IT use is not only accessible, but secure. Secure the Data not the Device Building a gateway is part of meeting the security challenge of Hybrid IT. Because workers take advantage of the BYOD approach,andmanagingtheaccessandauthenticationoftheir device must be a critical component of any security strategy. This requires the use of a device container, so workers can utilize BYOD securely and peacefully coexist with personal and corporate applications on their device. The container eliminates the enterprise need to manage the entire device and protects worker privacy. Securing the tunnel using identity management tools and technology, and ultimately securing the device container, to collaborate and work together globally in a secure environment – with any device accessing information in the datacenter or in the cloud, wheneverand wherever they choose. Location, location, location – it really doesn’t matter anymore. Because users work anywhere, at any time, and are much more productive. Thanks to advances in technology, this productivity gain is possible, even though evolving security risk continuously challenges it. Secure the tunnels to the datacenter and the cloud, enable workers to use any secured device – be it their own or not, and you have the ingredients for a very productive and secure work environment. Insuring remote and mobile security should encompass multilayered access that is right solutions and tools, expediting access will also aid in making Hybrid IT the productive platform that it is. Today’s worker is able to do things they could not do before – simply because secure access technology allows them to do it. And they can produce not just from their from anywhere in the world. This is a game changer. www.pulsesecure.net 1110 Transforming Enterprise Productivity with Hybrid IT
  • 7. A CASB model is ideal to enable Hybrid IT. It allows access to numerous common cloud-based SaaS applications via mobile devices and use cloud applications and corporate data parked in legacy databases and servers at their parent company. It is a value-added approach. However, proceed with caution. Its full embrace must honestly ask and answer some key questions before taking this route. Here are seven questions to consider to accelerate its success: 1.What skill sets and IT competencies will be required to maintain this model once in place? There are new apps, new IT silos, and perhaps several new ways of doing business. Is everyone ready and trained to embrace them and work with a CASB model? 2. What about Scalability? What will we face when it’s the CASB model ready and able to scale with it? 3. How will we manage increasing operational complexity as new technology and new approaches come about and are required to compete? Everyday a new wave of technology arrives. Often this adds to operational complexity. So how will this all be incorporated and anticipated with CASB? 4. What about extending existing services and apps? services with devices and apps. Focus on swiftly making them available and integrate this with CASB. 5. What is our plan for compliance enforcement? A dispersed workforce with multiple devices presents compliance risk. Will device compliance and enforcement be incorporated into your CASB model so that it does not fall wayward? 6. How much can we rely on CASB? Will CASB’s proxy technology – sitting right smack dab in the data path, deliver the service we demand and require? How reliable is it and will it interfere at all with data access? 7. Will this all be transparent to the user experience once CASB is in place? Users want easy access to data – be it from the datacenter or the cloud; they do not want to sign on several times and even get kicked out, only to have to start over. Will this happen? It shouldn’t. Insure transparency is part of initial planning, but ongoing plans as well. embrace may be overcome. However, such questions need to be on the table when partnering with a CASB solutions provider. Retooling your network and providing users trusted seamless access to your datacenter and the cloud is a wonderful advanced strategy. Take time upfront to answer important questions and stimulate discussion so that CASB yields the true dividends and ROI you expect and ultimately avoid any pitfalls. Embracing The Cloud Access Security Broker (CASB) Model for Hybrid IT: Seven Key Questions You Need To Ask and Answer To Avoid Common Pitfalls As mobile device ownership and usage grows and applications. Enterprises must adapt their compliance, authorization and access security solutions to provide multi-layered protection without making application and information cumbersome to the user. CISOs are challenged to make Hybrid IT safe and secure by meeting all the challenges that it poses. Namely, they must authenticate user and device identity and through cutting-edge identity management tools and solutions, provide a safe tunnel by which applications in the cloud and on their very own premises may be accessed and utilized. employee productivity and the entire organization. About Pulse Secure Pulse Secure, LLC is a leading provider of access and mobile security solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes network access control and mobile security products to enable end user mobility securely and seamlessly in their organizations. Pulse Secure’s mission is to enable open, integrated enterprise system solutions that empower business productivity through seamless mobility. About the Author Jim Romeo is a freelance copywriter, workshop and seminar leader, speaker, coach, and author, with a focus on business and technology topics. He has written more than 800 feature articles on a wide array of topics, including IT, IT security, engineering design, marketing, supply chain management, telecommunications, emerging technologies, and leadership and professional development. His writing credits include Desktop Engineering, The Maritime Executive, SC Magazine and many more. He has a background in engineering and holds an MBA in marketing from Columbia University in New York. Copyright 2015 Pulse Secure, LLC. All rights reserved. Pulse Secure and the Pulse Secure logo are registered trademarks or Pulse Secure, LLC. All trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Pulse Secure assumes no responsibility for any inaccuracies in this document. Pulse Secure reserves the right to change, modify, transfer, or otherwise revise this publication without notice. CONCLUSION With Robust Security Measures, Hybrid IT Flourishes 1312 www.pulsesecure.netTransforming Enterprise Productivity with Hybrid IT
  • 8. Pulse Secure LLC 2700 Zanker Rd. Suite 200 San Jose, CA 95134 www.pulsesecure.net