{"id":4664,"date":"2023-04-14T11:50:00","date_gmt":"2023-04-14T11:50:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/07\/07\/pulse-policy-secure-nac-product-overview-and-insight\/"},"modified":"2023-06-06T15:52:08","modified_gmt":"2023-06-06T15:52:08","slug":"ivanti-policy-secure-review","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/","title":{"rendered":"Ivanti Policy Secure: NAC Product Review"},"content":{"rendered":"<p>As a spinoff of the network infrastructure leader, Juniper Networks, Ivanti\u2019s Policy Secure provides effective network access control built on a foundation of deep understanding of networks. However, with three rebrandings since 2014, many potential customers may not recognize the product as a long-tenured competitor in the NAC market. This article will explore the product in depth and explore the features, pros, cons, pricing, and other key aspects of Ivanti\u2019s NAC solution.<\/p>\n<p><em>To compare Ivanti Policy Secure against their competition, see the complete list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\" target=\"_blank\" rel=\"noopener\">top network access control (NAC) solutions<\/a>.<\/em><\/p>\n<h2>Who Is Ivanti?<\/h2>\n<p>The Ivanti corporation formed through a series of mergers and acquisitions of component companies such as: AppSense, Cherwell, MobileIron, Pulse Secure, RiskSense, and Wavelink. Unified under the Ivanti brand, the component technologies provide solutions for unified endpoint management, service management, asset management, supply chain operations, patching solutions, and zero trust solutions. Ivanti maintains 36 offices in 23 nations globally and has 3,100 employees servicing more than 38,000 customers with the help of over 4,000 partners.<\/p>\n<h2>Policy Secure<\/h2>\n<p>Ivanti <a href=\"https:\/\/www.ivanti.com\/company\/press-releases\/2020\/ivanti-acquires-mobileiron-and-pulse-secure\" target=\"_blank\" rel=\"noopener\">acquired Pulse Secure<\/a> on December 1, 2020, from Siris Capital. Previously, <a href=\"https:\/\/www.ivanti.com\/company\/history\/pulse-secure\" target=\"_blank\" rel=\"noopener\">Siris Capital had spun off Pulse Secure<\/a> as a standalone entity after acquiring the company from the enterprise networking leader, Juniper Networks.<\/p>\n<p>Ivanti NAC solution consists of four main components:<\/p>\n<ul>\n<li><strong>Policy Secure:<\/strong> Central policy management server<\/li>\n<li><strong>Enforcer:<\/strong> Enforcement points for user authentication<\/li>\n<li><strong>Secure Access Client:<\/strong> Endpoint user authentication, device compliance, and virtual private network (VPN) connections<\/li>\n<li><strong>Profiler:<\/strong> Ability to identify and classify endpoints<\/li>\n<\/ul>\n<p>Additionally, Policy Secure integrates with other Ivanti tools to offer additional features related to network security such as:<\/p>\n<ul>\n<li><strong>User behavior analytics (UEBA)<\/strong> tracking network data flow, user data, and device information available through integrations with the Ivanti One Management solution<\/li>\n<li><strong>Secure <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\" target=\"_blank\" rel=\"noopener\">virtual private network<\/a> (VPN)<\/strong> access through <a href=\"https:\/\/www.ivanti.com\/products\/connect-secure-vpn\" target=\"_blank\" rel=\"noopener\">Connect Secure<\/a><\/li>\n<li><strong>Zero trust network access<\/strong> through <a href=\"https:\/\/www.ivanti.com\/products\/ivanti-neurons-zero-trust-access\" target=\"_blank\" rel=\"noopener\">Ivanti Neurons<\/a><\/li>\n<\/ul>\n<figure id=\"attachment_29632\" aria-describedby=\"caption-attachment-29632\" style=\"width: 696px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-29632 size-large\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2023\/04\/ivanti-rules_node-1024x576.png\" alt=\"Ivanti rules node\" width=\"696\" height=\"392\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-rules_node-1024x576.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-rules_node-300x169.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-rules_node-768x432.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-rules_node-150x84.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-rules_node-696x392.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-rules_node-1068x601.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-rules_node.png 1200w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><figcaption id=\"caption-attachment-29632\" class=\"wp-caption-text\">Ivanti rules node<\/figcaption><\/figure>\n<h2>Agents<\/h2>\n<p><a href=\"https:\/\/help.ivanti.com\/ps\/help\/en_US\/PPS\/9.1R14\/9.1R14PPS_AdminGuide.pdf\" target=\"_blank\" rel=\"noopener\">Agent and agentless options<\/a> are available with Ivanti. Agentless connections require using web browsers to make <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">secure network<\/a> connections using layer 3 controls.<\/p>\n<p>Agents can be figured to download automatically to devices using Microsoft Windows. Host assessments by Policy Secure are performed through the endpoint security assessment plug-in (ESAP) agent installed on endpoints.<\/p>\n<h2>Applicable Metrics<\/h2>\n<p>Maximum concurrent users varies depending upon the <a href=\"https:\/\/www.ivanti.com\/resources\/library\/datasheets\/ivi-2548-appliance-series-os.pdf\" target=\"_blank\" rel=\"noopener\">appliance capabilities<\/a>. Low-end physical and virtual appliances support up to 200 concurrent users and high-end appliances support up to 50,000 concurrent users.<\/p>\n<p>Similarly, appliance size determines the expected login rate and max tunnel throughput. Users can perform between 20 and 122 logins per second. Max tunnel throughput will depend upon the mode \u2014 for encapsulating security payload (ESP) tunnel mode the tunnel throughput maximum will vary between 200 Mbps and 4.2 Gbps, and for secure socket layer (SSL) mode the tunnel throughput maximum will vary between 100 Mbps and 2.8 Gbps.<\/p>\n<p>Appliances may be clustered for high availability (synchronized active and passive devices) or load balancing (all devices active). Using a license manager, clustering, and multiple devices can create a large, high volume instance. Ivanti does not disclose the maximum number of endpoints such an infrastructure can support.<\/p>\n<h2>Security Qualifications<\/h2>\n<p>Ivanti Policy Secure <a href=\"https:\/\/help.ivanti.com\/ps\/help\/en_US\/PPS\/9.1R14\/9.1R14PPS_AdminGuide.pdf\" target=\"_blank\" rel=\"noopener\">provides FIPS level 1<\/a> (FIPS 140-1 and 140-2) support and security certifications that support compliance with HIPAA, PCI DSS, ISO 27001, and other security standards.<\/p>\n<h2>Features<\/h2>\n<ul>\n<li><strong>Automated threat responses<\/strong> to indicators of compromise<\/li>\n<li><strong>Centralized visibility and policy management<\/strong> of all endpoints \u2014 workstations, laptops, and internet of things (IoT) devices<\/li>\n<li><strong>Bidirectional third party integration<\/strong> to improve security and auditing\n<ul>\n<li>Firewalls: Checkpoint, Fortinet, Juniper, Palo Alto Networks, etc.<\/li>\n<li>Security information and event management (SIEM): IBM QRadar, Splunk, etc.<\/li>\n<li>And more: Nozomi Guardian (industrial IOT and operational technology tracking), Trellix ePolicy Orchestrator, etc.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Built-in behavior analytics<\/strong> trained during the Policy Secure learning period<\/li>\n<li><strong>BYOD onboarding<\/strong> with third party enterprise mobile management integration or virtual Application Delivery Controller (vADC)<\/li>\n<li><strong>Customizable user experience<\/strong> options such as custom logos, background colors, personalized greetings for users, etc.<\/li>\n<li><strong>Dynamic network segmentation<\/strong> based on user role and device classification<\/li>\n<li><strong>Granular assessment<\/strong> of endpoint security posture before allowing access<\/li>\n<li><strong>Layer 2 NAC enforcement<\/strong> through 802.1x, MAC authentication, simple network management protocol (SNMP), and secure socket shell (SSH) protocol<\/li>\n<li><strong>Layer 3 NAC enforcement<\/strong> through integration with firewalls, intrusion detection and prevention solutions, and ethernet switches<\/li>\n<li><strong>RADIUS and TACACS+<\/strong> support for device and other multi-factor authentication devices<\/li>\n<li><strong>Self-service onboarding<\/strong> for devices and users in known identity and access management systems<\/li>\n<\/ul>\n<h2>Pros<\/h2>\n<ul>\n<li><strong>Customizable reports<\/strong> for key performance indicator tracking, auditing, and compliance<\/li>\n<li><strong>Guest onboarding<\/strong> included with the basic license instead of an add-on module<\/li>\n<li><strong>More than 2.3 million IoT<\/strong> device profiles included<\/li>\n<li><strong>Potentially lower total cost of ownership (TCO)<\/strong> for organizations with less complicated needs when compared to higher-profile competitors<\/li>\n<li><strong>Secure connections<\/strong> for local and remote users<\/li>\n<li><strong>Simple implementation<\/strong> and connection for servers and network equipment<\/li>\n<li><strong>Wide operating system compatibility<\/strong> \u2014 Windows, macOS, Linux, Android, and iOS<\/li>\n<li><strong>Wizard-based<\/strong> deployment and setup ensures easy implementation and no missed steps<\/li>\n<\/ul>\n<h2>Cons<\/h2>\n<ul>\n<li><strong>Lengthy connection processes<\/strong>, according to customers<\/li>\n<li><strong>Confusing licensing<\/strong> based upon reserved licenses, lease durations, license recall procedures, and surrendering licenses makes it difficult to predict costs in variable usage settings<\/li>\n<li><strong>Instability for some virtual private network (VPN) users<\/strong>; however, this may be caused by incorrect setup where conflicts between incompatible session heartbeat intervals and host checker intervals create disconnections<\/li>\n<li><strong>Host checking capabilities are significantly limited<\/strong> on devices running Linux, Solaris, and mobile devices and somewhat limited for macOS<\/li>\n<li><strong>Not as expansive and robust<\/strong> as higher-profile competitors<\/li>\n<li><strong>Poor brand recognition<\/strong> compared to its competitors<\/li>\n<\/ul>\n<h2>Intelligence<\/h2>\n<p>Ivanti Policy Secure, trained during a learning period, can perform basic behavior analytics. Secure also consumes threat intelligence information from third party sources such as firewalls and IDS systems or through additional Ivanti modules and products. Intelligence can be used to perform automated security responses.<\/p>\n<h2>Delivery<\/h2>\n<p>Ivanti Policy Secure can be deployed as physical appliances or installed as a virtual machine in local data centers or in the cloud. Devices can be clustered in two or more units to provide load balancing (all active) or high availability (some passive) benefits.<\/p>\n<p>Wide area network (WAN) clusters are possible, but only on specific appliances.Devices can be deployed with attached licenses, or a server may be created to perform license management across multiple appliances.<\/p>\n<h2>Pricing<\/h2>\n<p>Organizations need to obtain appliances (virtual or physical), licenses for the servers based upon the number of expected users, and additional licenses for optional modules. Bundled pricing, volume discounts, and pricing discounts are likely, but no pricing is officially published by Ivanti, so organizations should <a href=\"https:\/\/www.ivanti.com\/lp\/quote\" target=\"_blank\" rel=\"noopener\">contact Ivanti<\/a> for quotes.<\/p>\n<p>Some example partner pricing is listed, but organizations need to be sure of the currency (e.g., US dollars vs. Canadian dollars) and that the configurations are the same since some resellers quote appliances bundled with services while others sell the products separately.<\/p>\n<p>Ivanti currently sells <a href=\"https:\/\/www.ivanti.com\/resources\/library\/datasheets\/ivi-2548-appliance-series-os.pdf\" target=\"_blank\" rel=\"noopener\">five different hardware models and three virtual appliance<\/a> configurations.<\/p>\n<ul>\n<li><strong>PSA300 Mini Appliance:<\/strong> 200 users max for smallest needs<\/li>\n<li><strong>PSA3000 Rack Mountable Server (1RU):<\/strong> 200 users max for smallest needs<\/li>\n<li><strong>PSA5000 Rack Mountable Server (1RU):<\/strong> 2,500 users max for small and medium enterprises<\/li>\n<li><strong>PSA7000c Rack Mountable Server (2RU):<\/strong> 25,000 users max for enterprise needs, copper port connections<\/li>\n<li><strong>PSA7000f Rack Mountable Server (2RU):<\/strong> 25,000 users max for enterprise needs, fiber port connections<\/li>\n<li><strong>PSA3000-V Virtual Server:<\/strong> 200 users max for smallest needs<\/li>\n<li><strong>PSA5000-V Virtual Server:<\/strong> 2,500 users max for small and medium enterprises<\/li>\n<li><strong>PSA7000-V Virtual Server:<\/strong> 10,000 users max for enterprise needs<\/li>\n<\/ul>\n<p>Users can download licenses from the <a href=\"https:\/\/portal.ivanti.com\/\" target=\"_blank\" rel=\"noopener\">Software Download Center<\/a> using the same credentials as the <a href=\"https:\/\/forums.ivanti.com\/s\/welcome-pulse-secure?language=en_US\" target=\"_blank\" rel=\"noopener\">Ivanti Community site<\/a>. Licenses can be downloaded and managed by specific appliances or managed by a licensing server.<\/p>\n<p>The appliances support four different types of licenses:<\/p>\n<ul>\n<li><strong>Pulse Secure Evaluation license<\/strong><\/li>\n<li><strong>Pulse Secure Perpetual license<\/strong> (requires support subscription for future updates)<\/li>\n<li><strong>Pulse Secure Subscription licenses<\/strong><\/li>\n<li><strong>Pulse Secure In-Case-of-Emergency (ICE) licenses<\/strong> to cover temporary surges in license demand<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.ivanti.com\/support\/global-renewal-policies-and-practices\" target=\"_blank\" rel=\"noopener\">Perpetual licenses<\/a> include 12 months of maintenance and support. Further maintenance contracts must be purchased to obtain future updates and support, including patches, updates, upgrades, and content feeds such as IoT profiles. Upon the expiration of maintenance, the appliance may be used as-is without upgrades.<\/p>\n<p>Subscription or term licenses may be purchased for one, two, and three years and include software, updates, and support. At the expiration of a subscription, the appliance may no longer be used.<\/p>\n<p>Lapsed licenses require a reinstatement fee based upon the annual fee. Renewal fees typically increase by 5% per year.<\/p>\n<p>Ivanti offers four levels of support: Standard, Premium, Enterprise and Success Squad. All customers are automatically enrolled in standard support, which includes the customer community, a knowledge base, and a support response time of 2 hours (24&#215;7) via the online portal or phone. Premium includes self-guided resources, one Advantage Learning License, a named support manager, and a support response time of one hour.<\/p>\n<p>Enterprise support adds a designated customer service manager, success plan, expert coaching programs, quarterly business reviews, one virtual instructor-led class, and a designated enterprise support engineer. Success Squad adds personalized success plans, technical guidance and validation on upgrades, additional learning licenses and virtual instructor-led classes, go-live support, and health checks.<\/p>\n<h2>Bottom Line: Top Alternative to Higher-Priced Solutions<\/h2>\n<p>Ivanti Policy Secure does not contain as robust an IoT database or lengthy integration list compared with more prominent competitors in the NAC solution market. However, Policy Secure can deliver automated guest onboarding with the basic license when many larger, more expensive competitors require add-on modules to deliver the same capabilities.<\/p>\n<p>Although Ivanti\u2019s licensing model can be confusing, Policy Secure has the potential to deliver robust, fundamental network access control with a lower total cost of ownership. Enterprises with less complex needs and networks should include Ivanti Policy Secure on their evaluation list to ensure a low-cost comparison against other brands.<\/p>\n<p><em>This article was originally written by <a href=\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\" target=\"_blank\" rel=\"noopener\">Drew Robb<\/a> on July 7, 2017, and was updated by <a href=\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\" target=\"_blank\" rel=\"noopener\">Chad Kime<\/a> on April 14, 2023.<\/em><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d53547b44-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d53547b44\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d53547b44\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d53547b44\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d53547b44\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d53547b44\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d53547b44\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As a spinoff of the network infrastructure leader, Juniper Networks, Ivanti\u2019s Policy Secure provides effective network access control built on a foundation of deep understanding of networks. However, with three rebrandings since 2014, many potential customers may not recognize the product as a long-tenured competitor in the NAC market. This article will explore the product [&hellip;]<\/p>\n","protected":false},"author":271,"featured_media":29633,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[18684,21812],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[378,377,375],"class_list":["post-4664","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-nac","tag-network-access-control","b2b_audience-awareness-and-consideration","b2b_product-endpoint-security","b2b_product-gateway-and-network-security","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ivanti Policy Secure NAC Review | eSP<\/title>\n<meta name=\"description\" content=\"Pulse Policy&#039;s NAC solution supports up to 50,000 concurrent users and offers automatic deployment and threat intelligence options.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ivanti Policy Secure NAC Review | eSP\" \/>\n<meta property=\"og:description\" content=\"Pulse Policy&#039;s NAC solution supports up to 50,000 concurrent users and offers automatic deployment and threat intelligence options.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-14T11:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-06T15:52:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Ivanti Policy Secure: NAC Product Review\",\"datePublished\":\"2023-04-14T11:50:00+00:00\",\"dateModified\":\"2023-06-06T15:52:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/\"},\"wordCount\":1610,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png\",\"keywords\":[\"NAC\",\"Network Access Control\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/\",\"name\":\"Ivanti Policy Secure NAC Review | eSP\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png\",\"datePublished\":\"2023-04-14T11:50:00+00:00\",\"dateModified\":\"2023-06-06T15:52:08+00:00\",\"description\":\"Pulse Policy's NAC solution supports up to 50,000 concurrent users and offers automatic deployment and threat intelligence options.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png\",\"width\":1400,\"height\":933,\"caption\":\"Network access control concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ivanti Policy Secure: NAC Product Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ivanti Policy Secure NAC Review | eSP","description":"Pulse Policy's NAC solution supports up to 50,000 concurrent users and offers automatic deployment and threat intelligence options.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/","og_locale":"en_US","og_type":"article","og_title":"Ivanti Policy Secure NAC Review | eSP","og_description":"Pulse Policy's NAC solution supports up to 50,000 concurrent users and offers automatic deployment and threat intelligence options.","og_url":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/","og_site_name":"eSecurity Planet","article_published_time":"2023-04-14T11:50:00+00:00","article_modified_time":"2023-06-06T15:52:08+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Ivanti Policy Secure: NAC Product Review","datePublished":"2023-04-14T11:50:00+00:00","dateModified":"2023-06-06T15:52:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/"},"wordCount":1610,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png","keywords":["NAC","Network Access Control"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/","url":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/","name":"Ivanti Policy Secure NAC Review | eSP","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png","datePublished":"2023-04-14T11:50:00+00:00","dateModified":"2023-06-06T15:52:08+00:00","description":"Pulse Policy's NAC solution supports up to 50,000 concurrent users and offers automatic deployment and threat intelligence options.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/ivanti-policy-secure-review.png","width":1400,"height":933,"caption":"Network access control concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/ivanti-policy-secure-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Ivanti Policy Secure: NAC Product Review"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4664"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=4664"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4664\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/29633"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=4664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=4664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=4664"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=4664"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=4664"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=4664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}