You are here: Pulse Connect Secure > Pulse Connect Secure Administration Guide > Introduction to Pulse Connect Secure > Introduction > Pulse Connect Secure Overview > How Pulse Connect Secure Works

How Pulse Connect Secure Works

Pulse Connect Secure authorizes the resources that are accessed by users through an extranet session hosted by the appliance. Pulse Connect Secure intermediates the data that flows between external users and the company’s internal resources to provide robust security. The following diagram is an example of Pulse Connect Secure within a LAN environment.

Figure 1: Pulse Connect Secure Working Within a LAN

During the process of intermediation, the PCS receives secure requests from the external, authenticated users and makes the request to the internal resources on behalf of the users. By intermediating, the need to deploy extranet toolkits in traditional demilitarized zones (DMZ) or provision a remote access VPN for employees is eliminated.

Related Topics