Ivanti Policy Secure (IPS), formerly Pulse Policy Secure, is a next-generation Network Access Control (NAC) solution that provides complete visibility and Zero Trust access control for all local and remote endpoints, including managed devices, BYOD, IoT, and OT devices. Built on a foundation of Juniper Networks’ network infrastructure expertise, it enforces role-based access and endpoint security policies across wired, wireless, and VPN networks. Ivanti Policy Secure leverages an AAA (authentication, authorization, accounting) framework to bind user identities to devices and networks, ensuring only authorized and compliant users/devices access resources. Key features include automated device profiling, endpoint posture assessment (pre- and post-connection), automated guest access, and integration with third-party security solutions (e.g., Palo Alto Networks, Splunk) for threat response. It supports up to 50,000 concurrent users and is designed for small to large enterprises, offering seamless roaming from VPN to on-premises and compliance with standards like GDPR, HIPAA, and PCI-DSS.
NAC, Software
Ivanti Policy Secure (IPS)
Availability:
Available on backorder
Ivanti Policy Secure is a next-gen NAC solution that delivers Zero Trust access control, complete endpoint visibility, and automated policy enforcement for wired, wireless, and VPN networks, integrating with multi-vendor infrastructure and security ecosystems.
Compare
- Architecture:
- Components:
- Policy Secure Server: Core platform for authentication, profiling, policy enforcement, and monitoring; deployed as hardware (ISA series) or virtual appliances.
- Secure Access Client: Unified client for endpoint authentication, compliance checks, and VPN access (supports Windows, macOS, iOS, Android).
- Profiler: Standalone module for automated device discovery, classification, and monitoring.
- Enterprise Manager: Optional for centralized management of multiple appliances in large deployments.
- Deployment Options: Hardware appliances (ISA-6000, ISA-8000), virtual appliances (VMware, Hyper-V, AWS, Azure), or cloud-hosted (AWS Marketplace, BYOL 2/3 NIC).
- Scalability: Supports up to 50,000 concurrent users; appliances can be clustered for high availability and load balancing.
- Operation Mode: Out-of-band, integrating with existing network infrastructure; supports inline enforcement for specific use cases.
- Components:
- Authentication:
- Protocols: 802.1X, MAB, Captive Portal, SAML 2.0 for SSO, RADIUS, TACACS+.
- Methods: Certificate-based, username/password, multi-factor authentication (MFA).
- Integrations: Active Directory, LDAP, Azure AD, Okta, Pulse MDM, third-party EMM (e.g., MobileIron, Intune).
- Agentless/Agent-Based: Agentless via web browser (Layer 3 controls); Secure Access Client or ESAP for agent-based authentication and posture checks.
- Profiling:
- Methods: DHCP fingerprinting, MAC OUI, HTTP/HTTPS analysis, SNMP, and network telemetry; Profiler module for rogue device detection.
- Capabilities: Identifies device type, OS, vendor, and security state; supports managed, unmanaged, and IoT devices.
- User Behavior Analytics (UEBA): Detects IoT rogue devices, DGA attacks, and MAC spoofing.
- Policy Enforcement:
- Mechanisms: VLAN assignment, ACLs, role-based access control (RBAC), network segmentation, QoS parameters.
- Policies: Granular, based on user identity, group roles, device compliance, and session context.
- Wizard Editor: Simplifies policy creation with adaptive authentication and RBAC.
- Posture Assessment:
- Checks: Antivirus status, OS patches, firewall settings, and compliance with corporate policies.
- Methods: Endpoint Security Assessment Plug-in (ESAP) for agent-based checks; agentless via web browser.
- Actions: Quarantine, remediate, or restrict non-compliant devices.
- Guest Access:
- Features: Automated, sponsored, and time-based guest access with self-registration portals.
- Automation: Simplifies guest onboarding with sponsor-based authorization.
- Threat Containment:
- Actions: Quarantine, VLAN reassignment, session termination, or integration with NGFWs for blocking.
- Automation: Responds to malware, rogue devices, or unauthorized access based on UEBA or third-party alerts.
- Integrations: Bidirectional with NGFWs (Palo Alto, Fortinet, Juniper), SIEMs (Splunk, IBM QRadar), and XDR.
- Integrations:
- Ecosystem: Microsoft Intune, MobileIron, Palo Alto Networks, Fortinet, Juniper, Splunk, IBM QRadar, and others.
- Network Devices: Vendor-agnostic, supports Cisco, Aruba, Juniper, and other switches, APs, and routers.
- APIs: REST APIs and syslog for custom integrations.
- Visibility:
- Dashboards: Real-time monitoring of endpoints, compliance status, and network activity.
- Reports: Customizable for authentication, profiling, guest access, and compliance audits.
- Profiler: Builds database of unmanaged devices (e.g., printers, VoIP phones) for consistent security.