cancel
Showing results for 
Search instead for 
Did you mean: 

How does Pulse Zero Trust Access (PZTA) work?

Highlighted
Community Manager

How does Pulse Zero Trust Access (PZTA) work?

PTZA governs every access request and session via a centrally deployed and managed policy. It then augments these policies with built-in User and Entity Behavior Analytics (UEBA) where attributes for every session are monitored and assessed, and proprietary risk scoring algorithms can identify non-compliant, malicious, and anomalous activity - enabling expedited threat mitigation actions.

 

 

ZTA-Controller-diagram@2x.png