Software Alternatives, Accelerators & Startups

Azure Security Center VS Pulse Secure

Compare Azure Security Center VS Pulse Secure and see what are their differences

Azure Security Center logo Azure Security Center

Turn on Azure Security Center to gain unmatched hybrid cloud security management and threat protection for your workloads.

Pulse Secure logo Pulse Secure

Pulse Secure provides a consolidated offering for access control, SSL VPN, and mobile device security. Contact Pulse Secure at 408-372-9600 to get a free demo.
  • Azure Security Center Landing page
    Landing page //
    2023-03-26
  • Pulse Secure Landing page
    Landing page //
    2023-09-16

Azure Security Center videos

Azure Security Center Overview

More videos:

  • Review - Protect your cloud workload from threats using Azure Security Center | BRK3188
  • Review - Microsoft Azure Security Center for IoT

Pulse Secure videos

Pulse Secure VPN demo for Chrome

Category Popularity

0-100% (relative to Azure Security Center and Pulse Secure)
Security
32 32%
68% 68
Security & Privacy
0 0%
100% 100
Monitoring Tools
57 57%
43% 43
Web Application Security
100 100%
0% 0

User comments

Share your experience with using Azure Security Center and Pulse Secure. For example, how are they different and which one is better?
Log in or Post with

What are some alternatives?

When comparing Azure Security Center and Pulse Secure, you can also consider the following products

Qualys - Qualys helps your business automate the full spectrum of auditing, compliance and protection of your IT systems and web applications.

StackPath - Secure Content Delivery Network, DDoS, WAF Service

Google Cloud Platform Security Overview - Cloud Workload Protection Platforms

Avast - Avast security software products are developed for Microsoft Windows, Mac OS X, Android and Linux users by AVAST Software.

Nutanix Beam - Nutanix Beam is a multi-cloud optimization service

Flexera Software Vulnerability Manager - Flexera Software Vulnerability Manager provides solutions to continuously track, identify and remediate vulnerable applications.