Pulse Secure Download For Mac Catalina

Posted on  by 



About Apple security updates

Pulse Secure is qualifying MacOS Catalina with the current beta release. You have to update it to the latest one. Pulse official site also confirmed this: Can customers try Pulse Secure products on macOS Catalina? Pulse Secure encourages customers to try the MacOS Catalina with the latest PDC clients of 9.0 and 9.1. Shop for cheap price Download Endpoint Security Vpn For Mac And Pulse Secure Vpn Catalina. Download the Pulse Secure Client. Download the Pulse Secure Client for Mac from the Smith Software site. Scroll down to the Misc. Double-click the plusev5.pkg to start the install. Accept the defaults and if prompted, enter for your username and password to install new software. Restart your computer. Pulse Secure has qualified macOS Catalina 10.15 with Pulse Connect Secure / Pulse Policy Secure 9.1R4 and Pulse Desktop Client 9.1.4.1761. The software can be downloaded from our support site.

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

macOS Catalina 10.15

Released October 7, 2019

AMD

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2019-8748: Lilang Wu and Moony Li of TrendMicro Mobile Security Research Team

apache_mod_php

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Multiple issues in PHP

Description: Multiple issues were addressed by updating to PHP version 7.3.8.

CVE-2019-11041

CVE-2019-11042

Audio

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved state management.

CVE-2019-8706: Yu Zhou of Ant-financial Light-Year Security Lab

Entry added October 29, 2019

Audio

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing a maliciously crafted audio file may disclose restricted memory

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2019-8850: Anonymous working with Trend Micro Zero Day Initiative

Entry added December 4, 2019

Books

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Catalina

Impact: Parsing a maliciously crafted iBooks file may lead to a persistent denial-of-service

Description: A resource exhaustion issue was addressed with improved input validation.

CVE-2019-8774: Gertjan Franken imec-DistriNet of KU Leuven

Entry added October 29, 2019

CFNetwork

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing maliciously crafted web content may lead to a cross site scripting attack

Description: This issue was addressed with improved checks.

CVE-2019-8753: Łukasz Pilorz of Standard Chartered GBS Poland

Entry added October 29, 2019

CoreAudio

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing a maliciously crafted movie may result in the disclosure of process memory

Description: A memory corruption issue was addressed with improved validation.

CVE-2019-8705: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

CoreAudio

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Playing a malicious audio file may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved input validation.

CVE-2019-8592: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

Entry added November 6, 2019

CoreCrypto

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing a large input may lead to a denial of service

Description: A denial of service issue was addressed with improved input validation.

CVE-2019-8741: Nicky Mouha of NIST

Entry added October 29, 2019

CoreMedia

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved state management.

CVE-2019-8825: Found by GWP-ASan in Google Chrome

Entry added October 29, 2019

Crash Reporter

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: The 'Share Mac Analytics' setting may not be disabled when a user deselects the switch to share analytics

Description: A race condition existed when reading and writing user preferences. This was addressed with improved state handling.

CVE-2019-8757: William Cerniuk of Core Development, LLC

CUPS

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An attacker in a privileged network position may be able to leak sensitive user information

Description: An input validation issue was addressed with improved input validation.

CVE-2019-8736: Pawel Gocyla of ING Tech Poland (ingtechpoland.com)

Entry added October 29, 2019

CUPS

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing a maliciously crafted string may lead to heap corruption

Description: A memory consumption issue was addressed with improved memory handling.

CVE-2019-8767: Stephen Zeisberg

Entry added October 29, 2019

CUPS

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An attacker in a privileged position may be able to perform a denial of service attack

Description: A denial of service issue was addressed with improved validation.

CVE-2019-8737: Pawel Gocyla of ING Tech Poland (ingtechpoland.com)

Entry added October 29, 2019

dyld

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An application may be able to execute arbitrary code with system privileges

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2019-8776: Jann Horn of Google Project Zero

Entry added February 3, 2020

File Quarantine

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A malicious application may be able to elevate privileges

Description: This issue was addressed by removing the vulnerable code.

CVE-2019-8509: CodeColorist of Ant-Financial LightYear Labs

Entry added October 29, 2019

Foundation

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2019-8746: Natalie Silvanovich and Samuel Groß of Google Project Zero

Entry added October 29, 2019

Graphics

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing a malicious shader may result in unexpected application termination or arbitrary code execution

Description: Multiple memory corruption issues were addressed with improved input validation.

CVE-2018-12152: Piotr Bania of Cisco Talos

CVE-2018-12153: Piotr Bania of Cisco Talos

CVE-2018-12154: Piotr Bania of Cisco Talos

Entry added October 29, 2019

IOGraphics

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A local user may be able to cause unexpected system termination or read kernel memory

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2019-8759: another of 360 Nirvan Team

Entry added October 29, 2019

Intel Graphics Driver

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An application may be able to execute arbitrary code with system privileges

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2019-8758: Lilang Wu and Moony Li of Trend Micro

IOGraphics

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A malicious application may be able to determine kernel memory layout

Description: A logic issue was addressed with improved restrictions.

CVE-2019-8755: Lilang Wu and Moony Li of Trend Micro

Kernel

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A local app may be able to read a persistent account identifier

Description: A validation issue was addressed with improved logic.

CVE-2019-8809: Apple

Entry added October 29, 2019

Kernel

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A malicious application may be able to determine kernel memory layout

Description: A memory corruption issue existed in the handling of IPv6 packets. This issue was addressed with improved memory management.

CVE-2019-8744: Zhuo Liang of Qihoo 360 Vulcan Team

Entry added October 29, 2019

Kernel

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2019-8717: Jann Horn of Google Project Zero

Kernel

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: A memory corruption issue was addressed with improved state management.

CVE-2019-8709: derrek (@derrekr6) derrek (@derrekr6)

CVE-2019-8781: Linus Henze (pinauten.de)

Entry updated October 29, 2019

libxml2

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Multiple issues in libxml2

Description: Multiple memory corruption issues were addressed with improved input validation.

CVE-2019-8749: found by OSS-Fuzz

CVE-2019-8756: found by OSS-Fuzz

Entry added October 29, 2019

libxslt

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Multiple issues in libxslt

Description: Multiple memory corruption issues were addressed with improved input validation.

CVE-2019-8750: found by OSS-Fuzz

Entry added October 29, 2019

mDNSResponder

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An attacker in physical proximity may be able to passively observe device names in AWDL communications

Description: This issue was resolved by replacing device names with a random identifier.

CVE-2019-8799: David Kreitschmann and Milan Stute of Secure Mobile Networking Lab at Technische Universität Darmstadt

Entry added October 29, 2019

Menus

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved state management.

CVE-2019-8826: Found by GWP-ASan in Google Chrome

Entry added October 29, 2019

Notes

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A local user may be able to view a user’s locked notes

Description: The contents of locked notes sometimes appeared in search results. This issue was addressed with improved data cleanup.

CVE-2019-8730: Jamie Blumberg (@jamie_blumberg) of Virginia Polytechnic Institute and State University

PDFKit

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An attacker may be able to exfiltrate the contents of an encrypted PDF

Description: An issue existed in the handling of links in encrypted PDFs. This issue was addressed by adding a confirmation prompt.

CVE-2019-8772: Jens Müller of Ruhr University Bochum, Fabian Ising of FH Münster University of Applied Sciences, Vladislav Mladenov of Ruhr University Bochum, Christian Mainka of Ruhr University Bochum, Sebastian Schinzel of FH Münster University of Applied Sciences, and Jörg Schwenk of Ruhr University Bochum

PluginKit

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A local user may be able to check for the existence of arbitrary files

Description: A logic issue was addressed with improved restrictions.

CVE-2019-8708: an anonymous researcher

Entry added October 29, 2019

PluginKit

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An application may be able to execute arbitrary code with system privileges

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2019-8715: an anonymous researcher

Entry added October 29, 2019

Sandbox

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A malicious application may be able to access restricted files

Pulse Secure For Macbook

Description: An access issue was addressed with additional sandbox restrictions.

CVE-2019-8855: Apple

Entry added December 18, 2019

SharedFileList

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A malicious application may be able to access recent documents

Description: The issue was addressed with improved permissions logic.

CVE-2019-8770: Stanislav Zinukhov of Parallels International GmbH

sips

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An application may be able to execute arbitrary code with system privileges

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2019-8701: Simon Huang(@HuangShaomang), Rong Fan(@fanrong1992) and pjf of IceSword Lab of Qihoo 360

UIFoundation

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Parsing a maliciously crafted text file may lead to disclosure of user information

Description: This issue was addressed with improved checks.

CVE-2019-8761: Paulos Yibelo of Limehats, Renee Trisberg of SpectX

Entry updated August 10, 2020

UIFoundation

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Processing a maliciously crafted text file may lead to arbitrary code execution

Description: A buffer overflow was addressed with improved bounds checking.

CVE-2019-8745: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

UIFoundation

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: An application may be able to execute arbitrary code with system privileges

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2019-8831: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

Entry added November 18, 2019

WebKit

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: Visiting a maliciously crafted website may reveal browsing history

Description: An issue existed in the drawing of web page elements. The issue was addressed with improved logic.

Pulse Secure For Mac Catalina

CVE-2019-8769: Piérre Reimertz (@reimertz)

WebKit

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A user may be unable to delete browsing history items

Description: 'Clear History and Website Data' did not clear the history. The issue was addressed with improved data deletion.

CVE-2019-8768: Hugo S. Diaz (coldpointblue)

Wi-Fi

Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later)

Impact: A device may be passively tracked by its Wi-Fi MAC address

Description: A user privacy issue was addressed by removing the broadcast MAC address.

CVE-2019-8854: FuriousMacTeam of the United States Naval Academy and the Mitre Cooperation, Ta-Lun Yen of UCCU Hacker

Entry added December 4, 2019, updated December 18, 2019

Additional recognition

AppleRTC

We would like to acknowledge Vitaly Cheptsov for their assistance.

Entry added October 29, 2019

Audio

We would like to acknowledge riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative for their assistance.

Entry added October 29, 2019

boringssl

We would like to acknowledge Nimrod Aviram of Tel Aviv University, Robert Merget of Ruhr University Bochum, Juraj Somorovsky of Ruhr University Bochum, Thijs Alkemade (@xnyhps) of Computest for their assistance.

Entry added October 8, 2019, updated October 29, 2019

curl

We would like to acknowledge Joseph Barisa of The School District of Philadelphia for their assistance.

Entry added February 3, 2020, updated February 11, 2020

Finder

We would like to acknowledge Csaba Fitzl (@theevilbit) for their assistance.

Gatekeeper

We would like to acknowledge Csaba Fitzl (@theevilbit) for their assistance.

Identity Service

We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance.

Entry added October 29, 2019

Kernel

We would like to acknowledge Brandon Azad of Google Project Zero, Vlad Tsyrklevich for their assistance.

Entry updated July 28, 2020

Local Authentication

We would like to acknowledge Ryan Lopopolo for their assistance.

Entry added February 3, 2020

mDNSResponder

We would like to acknowledge Gregor Lang of e.solutions GmbH for their assistance.

Entry added October 29, 2019

python

Pulse Secure For Catalina

We would like to acknowledge an anonymous researcher for their assistance.

Entry added October 29, 2019

Safari Data Importing

We would like to acknowledge Kent Zoya for their assistance.

Security

We would like to acknowledge Pepijn Dutour Geerling (pepijn.io), an anonymous researcher for their assistance.

Entry added November 18, 2019

Simple certificate enrollment protocol (SCEP)

We would like to acknowledge an anonymous researcher for their assistance.

Siri

We would like to acknowledge Yuval Ron, Amichai Shulman and Eli Biham of Technion of Israel Institute of Technology for their assistance.

Entry added December 4, 2019, updated December 18, 2019

Telephony

We would like to acknowledge Phil Stokes from SentinelOne for their assistance.

VPN

Install Pulse Secure On Mac

We would like to acknowledge Royce Gawron of Second Son Consulting, Inc. for their assistance.

Entry added October 29, 2019

Pulse Secure Mac Os Download

Secure Remote Access

Enabling Business Continuity During Global Health Crisis

Rapidly deploy and scale without compromising performance, user experience, or security

Pulse Secure Cares. In a world where natural and man-made disasters occur, Pulse Secure wants to help keep your business running so you can focus on what’s really important – keeping your employees, friends, and family safe.

Work From Home: Pulse Connect Secure offers the easiest and fastest means to ensure employees working from home remain productive by enabling secure remote and mobile access from any device to enterprise services and applications in the data center and cloud. Pulse vADC integrates closely with Pulse Connect Secure to optimize connections to the nearest available locations, helping businesses stay online and assure service delivery.

Pulse Connect Secure enables you to:

  • Deliver fast, secure, and optimized access to data center applications and cloud services, while ensuring an easy, simple and consistent native-user experience across desktops, laptops, tablets, and smartphones.
  • Consolidate and streamline access for quick, secure connectivity to resources with always-on and simultaneous tunneling, SSO, MFA, and endpoint compliance checks to keep data secure.
  • Simplify network access administration with centralized web-based console, end-user self-provisioning, clientless use, and mobile platform integration for BYOD.
  • Rapid activation and scale-out without requiring hardware or client; runs in virtual, Azure, AWS and Alibaba cloud environments.

Pulse vADC with software-defined traffic management enables you to:

  • Increase app performance for WFH productivity and the launch of new online app and services
  • Gain greater web and virtual app responsiveness, scale, availability, security and service delivery
  • Deliver seamless user experience with Optimal Gateway Selection to ensure users connect to the nearest available gateway
  • Quickly and flexibly deploy software-based load balancing purpose-built for virtual and cloud portability

To aid our enterprise customers and their community in these unforeseen times and to help them continue to operate their businesses effectively and safely, we are offering flexible Pulse Connect Secure and Pulse vADC licensing. Even if you are not currently a customer, we want you to have peace of mind. We are standing by to help. Please take advantage of responsive sales and support services to ensure rapid implementation. See details or for immediate response, please COMPLETE FORM below.

  • SOLUTION FEATURES

  • OFFER DETAILS

Pulse Connect Secure is the industry’s most comprehensive and reliable remote access solution to secure connectivity from any device to applications and services in the cloud and data center. Our enterprise-class VPN delivers rapid deployment, ease of use, visibility and compliance with extensive interoperability and scale.

  • Secure and streamline access to cloud and data center apps and resources – anywhere, anytime – from device of choice
  • Rapid implementation – readily procure and deploy in virtual, Azure, AWS or Alibaba cloud environments
  • Always-on, per-app, split and simultaneous tunneling with broad application support means access protected and workers are more productive
  • Clientless access – access web applications and virtual desktops with nothing to install
  • Group policy – integrated with directory services like Active Directory and LDAP
  • Strong authentication – support for MFA, SAML 2.0, PKI, IAM, and digital certificates
  • Endpoint compliance – check remote devices for security compliance before making a connection
  • Unified client – native coverage across multiple OS’s for smooth roaming and delightful user experience
  • MDM integration – supports popular MDM platforms for increased BYOD usage with native policy enforcement
  • Single sign-on (SSO) – simplify access with SSO for expedited, authenticated application access
  • Centralized management – our Pulse One manager enables centralized administration of policy, compliance, and authorization across cloud and data center
  • Integrations – works with popular EMMs such as Intune, Airwatch and MobileIron; IDPs such as ADFS, Okta and Ping Identity; and SIEMs such as Splunk, LogRhythm, IBM Qradar and MF ArcSight

Business continuity goes beyond secure remote access. Pulse vADC helps organizations provide superior user experience with faster, more reliable application performance – taking advantage of software-based load balancing natively designed for virtual and cloud portability.

Offer: Expedited and flexible licensing to facilitate rapid implementation.

Offer Period: Register to receive expedited implementation support until September 30, 2020.

Pulse vADC Community Edition Offer: This offer allows organizations to readily deploy and gain the advantages of Pulse Virtual Traffic Manager with Optimal Gateway Selection. Pulse vADC Community Edition offers purpose-built virtual and cloud software-based load balancing limited to 10 Mbps and up to 4 nodes per cluster. Click here for full offer details or download vADC Community Edition from Amazon AWS, Microsoft Azure or Google Cloud.

This offer is valid to organizations with workforces located in regions impacted by the Coronavirus, where the virtual appliance and Pulse Connect Secure will be designated to support employees to work remotely in order to minimize health risks.

All licenses will be subject to Pulse Secure's standard End User License agreement and all other applicable standard terms and conditions. Pulse Secure reserves the right to amend, modify, cancel, suspend or terminate this promotion at any time without notice.

Get peace of mind - In Case of Emergency

Learn how to quickly obtain Pulse Connect Secure and/or Pulse vADC during this time of need. For immediate response, please complete this form below to have a Pulse Secure representative or authorized partner contact you.

Pulse Secure reserves the right to amend, modify, cancel, suspend or terminate this promotion at any time without notice.





Coments are closed