Powerful threat prediction, prevention, detection, and response along with compliance in a scalable, simple managed solution.
All-in-one networking solution that combines network connectivity, agility, security, and compliance in an affordable managed solution.
Accelerate business growth through our award-winning partner program.
Applies To: Pulse Secure Access
Pulse Secure Access’s suite offers complete, end-to-end usability, visibility, and protection to enable remote, mobile and cloud access to hybrid IT services and applications from any device.
Pulse Secure Access can be integrated with EventTracker using syslog. With the help of Pulse Secure Access knowledge pack, we can monitor the user URI requests, user login, and logout, user connection status on applications and trigger the alert whenever any user authentication failure is detected. EventTracker dashboard will help you to visualize the web activities on applications. It can even create the report which helps to collect user activities happening in the applications for a time interval. This will help you to review the different user activities. EventTracker CIM will help you to correlate the web requests from users, and user connection status with another log sources like web requests, user activities, user connection status, etc.
EventTracker Knowledge Pack for Pulse Secure Access allows you to monitor the following components: -
Once Pulse Secure Access is configured to deliver logs to EventTracker, knowledge objects and reports can be configured in EventTracker.
Some of the knowledge packs available in EventTracker are listed below. For more information, refer to the Integration Guide.