Paloalto networks Global Protect

VPN – Palo-Alto Global Protect Overview

Palo-Alto Global Protect is a Virtual Private Network (VPN) software. A VPN is required to securely connect to the Texas Southern University network services from off campus locations (i.e. Network file shares, non-Web applications).

It provides a secure network connectivity experience that empowers employees to work from anywhere, on laptops and mobile devices regardless of location.

This tool allows TSU Faculty and Staff to securely access the TSU Network from anywhere and with any device with an internet connection.

Need VPN Access? Here are the Steps:

  • Click here to fill the form for the staff
  • Click here to fill the form for the vendors/consultants
  • Complete Form
  • Complete the Applicant and Supervisor Signature section
  • Print and Turn form into OIT at Hannah Hall 320.
  • Or Scan the document and email the form to ITSecurityInfo@tsu.edu
  • You will be instructed on how to download and access VPN after approval.

Mobile Device Support
With the bring-your-own-device (BYOD) phenomenon, IT is required to support end-user productivity by enabling the use of personal mobile devices for remote access to the university network. Palo-Alto Global Protect can be deployed on any mobile device. Highly secure remote access eliminates unapproved applications and users from accessing confidential business resources, further reducing malware intrusion risks and bandwidth costs for remote access.

Highly Secure Network Access
Palo-Alto Global Protect is a unified agent that provides superior connectivity features, allowing IT to deliver multiple security services to help enable and protect the university. It provides the visibility and the control to identify who and what is accessing the TSU Network before, during, and after a security threat.

Web Security
Combining web security with VPN access, IT can provide comprehensive secure mobility to all end users, which is vital for bring-your-own-device (BYOD) deployments. IT will be better equipped to defend the network against web malware and to control and secure web usage on mobile devices.