about ivanti
We provide an excellent end-user experience
that enables every employee to stay productive
anytime and anywhere.
about ivanti
We provide an excellent end-user experience
that enables every employee to stay productive
anytime and anywhere.
ivanti is a global market leader that provides IT asset discovery, management, security, and service capabilities from cloud to edge—based on its solutions in UEM (Unified Endpoint Management), Security (Cybersecurity), and EXM (Experience Management)

Why ivanti
Acquisition of Leading
Security Vendors
By acquiring companies such as Pulse Secure, MobileIron, RiskSense, and Cherwell, Ivanti has built powerful solutions that enable Everywhere Work.
Portfolio of

User
∙Zero Sign-on
∙Anti-Phishing (MTD)
∙Secure Productivity Apps
∙Privilege Management
Access
∙Ivanti Neurons for ZTA (Zero Trust Access)
∙Ivanti Neurons for Secure Access
∙VPN
∙NAC
Device
∙Ivanti Neurons for (Risk-Based) Patch Intelligence
∙Ivanti Neurons for (Risk-Based) Vulnerability ∙Management
∙Mobile Threat Protection
∙Endpoint Threat Protection
∙Device Control
Application
∙Application Control
∙Application Security & Correlation for
∙Vulnerability Management
Observation / Action
∙Neurons for Discovery
∙Neurons for Edge Intelligence
∙Neurons for Healing
Security Appliance (ISA)
ISA (Ivanti Security Appliance) enables employees and users to securely access corporate resources and applications—regardless of where those resources are hosted.
The Ivanti Security Appliance Series can be deployed anywhere it’s needed, including data centers and cloud environments. For centralized control and visibility, deployments can be managed through nSA (Neurons for Secure Access), Ivanti’s cloud-hosted management and analytics platform.
ISA Series Performance
ISA 6000-V (Virtualized) | ISA 8000-V (Virtualized) | |
Maximum Concurrent Users | 2,500 | 25,000 |
Maximum Tunnel Throughput (ESP Mode)* | 3.5 Gbps | 4.5 Gbps |
RAM | 16 GB recommended | 332 GB recommended |
Interface | Configurable on host | Configurable on host |
*Performance metrics were measured in a lab environment using industry-standard performance tools.
**Actual product performance may vary depending on configuration complexity.
ISA Model Details
Virtual | Cloud | |||
Model and License Capacity | Model | User Capacity | Model | User Capacity |
ISA 4000-V ISA 6000-V ISA 8000-V | 250 2,500 25,000 | ISA 4000-V ISA 6000-V ISA 8000-V | 250 2,500 25,000 | |
Platform | VMware, KVM, Hyper-V | Azure, AWS, GCP | ||
Supported Software Services | VPN | VPN | ||
Software Licensing | Subscription | Subscription | ||
Clustering | Active / Active Active / Passive | Active / Active | ||
ICE (In Case of Emergency) | ✓ | ✓ | ||
License Server (On-Premises / Cloud) | ✓ | ✓ | ||
Neurons for Secure Access 관리 | ✓ | ✓ | ||
ISA Hardware Appliance
The ISA (Ivanti Security Appliance) Series hardware is designed as a simple plug-and-play solution to meet organizational requirements for Ivanti Connect Secure gateways.
Cutting-Edge Performance
Equipped with 10GbE interfaces for ultra-fast connectivity,
ISA hardware appliances are purpose-built to deliver the speed and reliability users expect—enabling true Everywhere Work.
Enhanced Security
ISA hardware appliances feature a hardened operating system kernel and an onboard TPM chip to ensure OS and software integrity, working together to protect organizational network assets.
Reduced TCO
Designed as a compact 1U rack-mounted server
with low power requirements,
ISA hardware delivers improved performance while meeting growing organizational demands and reducing data center costs.
Maximized Uptime
With redundant network interfaces,
hot-swappable storage, and dual power supplies,
the ISA 8000 minimizes downtime
and keeps users securely connected.
ISA Hardware Appliance Details
*Due to the discontinuation of key hardware components, new orders and renewals for the ISA6K and ISA8K hardware will be suspended as of January 31, 2026.
*Existing hardware in use will continue to receive technical support until January 31, 2027.
ISA 6000 | ISA 8000 C/F | |
Product image | ![]() | ![]() |
Form Factor | 1RU, rack-mountable | 1RU, rack-mountable |
Dimensions (WxHxD) | 437mm(17.2") x 43mm(1.7") x 287mm(11.3") | 437mm(17.2") x 43mm(1.7") x 507mm(19.98") |
Interface | 2 × 1/10 Gigabit UTP | 4 × 10 Gigabit UTP/Optical (Link Redundancy) |
RAM | 16GB | 64GB |
Hard Drive | 480GB SATA SSD | Dual 2TB SATA SSD (Redundant / Hot-swappable) |
Dedicated Management Port | Provided (1GbE) | Provided (1GbE) |
Serial Port | DB9 - Console | DB9 - Console |
Weight | 4.54kg(10lbs) | 8kg(17.6lbs) |
Power Supply | 200W | Dual 200W × 2, Total 400W (Redundant / Hot-swappable) |
Operating Temperature | 5℃~35℃ (41℉~95℉) | 10℃~35℃ (50℉~95℉) |
Unified Endpoint
Management (UEM)
UEM, the solution for modern device security and management, is offered as follows:
Secure UEM
Management capabilities for iOS, macOS, Android,
and Windows-based devices.
Capabilities
Secure UEM Premium
Extends security and device management capabilities with a secure productivity suite, secure connectivity, and advanced conditional access for both cloud applications and on-premises services.
Capabilities
Neurons for Secure Access
ivanti Neurons for Secure Access provides centralized cloud-based management and analytics for ICS iIvanti Connect Secure) VPN gateways.
Its unified interface controls the entire ICS deployment, significantly reducing the time, complexity, and risk involved in managing multi-node VPN environments.
Risky or abnormal user behavior is automatically resolved through intelligent remediation, while collected gateway logs and customizable reports deliver actionable insights.
ivanti Neurons for Secure Access minimizes overhead, maintains a secure environment, and maximizes the value of your VPN.

Neurons for Zero Trust Access
ZTA (Zero Trust Access) provides secure, application-centric access through continuous authentication and adaptive control.
By prioritizing identity and context, ZTA minimizes the attack surface, prevents lateral-movement threats, and enhances visibility across distributed application ecosystems — whether on-premises, private, or public cloud.
With automated threat detection, granular policy enforcement, and flexible gateway deployment options, ZTA is an ideal solution for organizations adopting Zero Trust principles to confidently protect users, applications, and data.
Implementing
a Zero Trust Access Model
As organizations transition to flexible work environments and embrace Everywhere Work, implementing a Zero Trust Access (ZTA) model has become essential for strengthening security.
Ivanti Neurons ZTA for Zero Trust Access delivers a powerful, application-centric approach that focuses on securing access to applications rather than the broader network.
It also provides a unified client that fully supports both Ivanti Connect Secure VPN and ivanti Neurons ZTA, enabling granular access control to proactively defend organizations against lateral movement attacks.
Application Access Control
and Manageme
Application access control and management play a critical role in protecting an organization’s data and resources. With ivanti Neurons ZTA for Zero Trust Access, you can implement granular policies that control access based on user identity, device, and location.
This solution can be tailored to meet unique business needs — allowing easy management of contractor access, enforcement of location-based authentication, and simplification of access management. While maintaining strong security standards, it efficiently grants access privileges to specific users or groups as needed, optimizing overall business operations.

Ivanti is a global market leader that provides IT asset discovery, management, security, and service capabilities from cloud to edge—based on its solutions in UEM (Unified Endpoint Management), Security (Cybersecurity), and EXM (Experience Management).
Why
Acquisition of Leading
Security Vendors
By acquiring companies such as Pulse Secure, MobileIron, RiskSense, and Cherwell, Ivanti has built powerful solutions that enable Everywhere Work.
Portfolio of
User
∙Zero Sign-on
∙Anti-Phishing (MTD)
∙Secure Productivity Apps
∙Privilege Management
Access
Device
∙Ivanti Neurons for ZTA (Zero Trust Access)
∙Ivanti Neurons for Secure Access
∙VPN
∙NAC
∙Ivanti Neurons for (Risk-Based) Patch Intelligence
∙Ivanti Neurons for (Risk-Based) Vulnerability ∙Management
∙Mobile Threat Protection
∙Endpoint Threat Protection
∙Device Control
Application
Observation / Action
∙Application Control
∙Application Security & Correlation for
∙Vulnerability Management
∙Neurons for Discovery
∙Neurons for Edge Intelligence
∙Neurons for Healing
Security Appliance (ISA)
ISA (Ivanti Security Appliance) enables employees and users to securely access corporate resources and applications—regardless of where those resources are hosted.
The Ivanti Security Appliance Series can be deployed anywhere it’s needed, including data centers and cloud environments. For centralized control and visibility, deployments can be managed through nSA (Neurons for Secure Access), Ivanti’s cloud-hosted management and analytics platform.
ISA Series Performance
ISA 6000-V (Virtualized) | ISA 8000-V (Virtualized) | |
Maximum Concurrent Users | 2,500 | 25,000 |
Maximum Tunnel Throughput (ESP Mode)* | 3.5 Gbps | 4.5 Gbps |
RAM | 16 GB recommended | 32 GB recommended |
Interface | Configurable on host | Configurable on host |
*Performance metrics were measured in a lab environment using industry-standard performance tools.
**Actual product performance may vary depending on configuration complexity.
ISA Model Details
Virtual | Cloud | |||
Model and License Capacity | Model | User Capacity | Model | User Capacity |
ISA 4000-V ISA 6000-V ISA 8000-V | 250 2,500 25,000 | ISA 4000-V ISA 6000-V ISA 8000-V | 250 2,500 25,000 | |
Platform | VMware, KVM, Hyper-V | Azure, AWS, GCP | ||
Supported Software Services | VPN | VPN | ||
Software Licensing | Subscription | Subscription | ||
Clustering | Active / Active Active / Passive | Active / Active | ||
ICE(In Case of Emergency) | ✓ | ✓ | ||
License Server (On-Premises / Cloud) | ✓ | ✓ | ||
Neurons for Secure Access Management | ✓ | ✓ | ||
ISA Hardware Appliance
The ISA (Ivanti Security Appliance) Series hardware is designed
as a simple plug-and-play solution to meet organizational requirements for Ivanti Connect Secure gateways.
Cutting-Edge Performance
Equipped with 10GbE interfaces for ultra-fast connectivity,
ISA hardware appliances are purpose-built to deliver the speed and reliability users expect—enabling true Everywhere Work.
Enhanced Security
ISA hardware appliances feature a hardened operating system kernel and an onboard TPM chip to ensure OS and software integrity, working together to protect organizational network assets.
Reduced TCO
Designed as a compact 1U rack-mounted server
with low power requirements,
ISA hardware delivers improved performance while meeting growing organizational demands and reducing data center costs.
Maximized Uptime
With redundant network interfaces,
hot-swappable storage, and dual power supplies,
the ISA 8000 minimizes downtime
and keeps users securely connected.
ISA Hardware Appliance Details
*Due to the discontinuation of key hardware components, new orders and renewals for the ISA6K and ISA8K hardware will be suspended as of January 31, 2026.
*Existing hardware in use will continue to receive technical support until January 31, 2027.
ISA 6000 | ISA 8000 C/F | |
| Product image | ![]() | ![]() |
| Form Factor | 1RU, rack-mountable | 1RU, rack-mountable |
Dimensions(WxHxD) | 437mm(17.2") x 43mm(1.7") x 287mm(11.3") | 437mm(17.2") x 43mm(1.7") x 507mm(19.98") |
Interface | 2 × 1/10 Gigabit UTP | 4 × 10 Gigabit UTP/Optical (Link Redundancy) |
| RAM | 16GB | 64GB |
| Hard Drive | 480GB SATA SSD | Dual 2TB SATA SSD (Redundant / Hot-swappable) |
| Dedicated Management Port | Provided (1GbE) | Provided (1GbE) |
| Serial Port | DB9 - Console | DB9 - Console |
| Weight | 4.54kg(10lbs) | 8kg(17.6lbs) |
| Power Supply | 200W | Dual 200W × 2, Total 400W (Redundant / Hot-swappable) |
| Operating Temperature | 5℃~35℃(41℉~95℉) | 10℃~35℃(50℉~95℉) |
Unified Endpoint Management (UEM)
UEM, the solution for modern device security and management, is offered as follows:
보안 UEMSecure UEM
Management capabilities for iOS, macOS, Android, and Windows-based devices.
Capabilities
∙ Separates personal and business data to maintain user privacy and security.
∙ Manages the complete end-to-end device lifecycle.
∙ Provides wireless provisioning for BYO and corporate-owned iOS, macOS, Android, and Windows devices.
∙ Distributes and configures apps remotely.
∙ Supports helpdesk tools to enhance the efficiency of remote assistance.
Secure UEM Premium
Extends security and device management capabilities with a secure productivity suite, secure connectivity, and advanced conditional access for both cloud applications and on-premises services.
Capabilities
∙ Enables secure connectivity through a scalable multi-OS VPN solution.
∙ Prevents unauthorized users, devices, and applications from connecting to business services.
∙ Supports remote productivity through secure email, browsing, and content management apps.
Neurons for Secure Access
Ivanti Neurons for Secure Access provides centralized cloud-based management and analytics for ICS (Ivanti Connect Secure) VPN gateways.
Its unified interface controls the entire ICS deployment, significantly reducing the time, complexity, and risk involved in managing multi-node VPN environments.
Risky or abnormal user behavior is automatically resolved through intelligent remediation, while collected gateway logs and customizable reports deliver actionable insights.
Ivanti Neurons for Secure Access minimizes overhead, maintains a secure environment, and maximizes the value of your VPN.
Neurons for Zero Trust Access
ZTA (Zero Trust Access) provides secure, application-centric access through continuous authentication and adaptive control.
By prioritizing identity and context, ZTA minimizes the attack surface, prevents lateral-movement threats, and enhances visibility across distributed application ecosystems — whether on-premises, private, or public cloud.
With automated threat detection, granular policy enforcement, and flexible gateway deployment options, ZTA is an ideal solution for organizations adopting Zero Trust principles to confidently protect users, applications, and data.
Implementing a Zero Trust Access Model
As organizations transition to flexible work environments and embrace Everywhere Work, implementing a Zero Trust Access (ZTA) model has become essential for strengthening security.
Ivanti Neurons ZTA for Zero Trust Access delivers a powerful, application-centric approach that focuses on securing access to applications rather than the broader network.
It also provides a unified client that fully supports both Ivanti Connect Secure VPN and Ivanti Neurons ZTA, enabling granular access control to proactively defend organizations against lateral movement attacks.
Application Access Control and Manageme
Application access control and management play a critical role in protecting an organization’s data and resources. With Ivanti Neurons ZTA for Zero Trust Access, you can implement granular policies that control access based on user identity, device, and location.
This solution can be tailored to meet unique business needs — allowing easy management of contractor access, enforcement of location-based authentication, and simplification of access management. While maintaining strong security standards, it efficiently grants access privileges to specific users or groups as needed, optimizing overall business operations.
Please leave your inquiry,
and our team will respond promptly.
SCIENS Co., Ltd.
Address
8 Teheran-ro 44-gil, Gangnam-gu, Seoul
(7F, ICON Yeoksam Building, Yeoksam-dong, 06210)
Business Registration No
211-88-98591
Main Line
+82 2-513-5400
mktg@sciens21.com
Sales Team
+82 2-513-5420
Technical Team
+82 2-513-5430
SCIENS Co., Ltd.
Address 8 Teheran-ro 44-gil, Gangnam-gu, Seoul (7F, ICON Yeoksam Building, Yeoksam-dong, 06210)
Business Registration No 211-88-98591 | Main Line +82 2-513-5400 | E-MAIL mktg@sciens21.com
Sales Team +82 2-513-5420 Technical Team +82 2-513-5430
© 2025 SCIENS Co., Ltd. All rights reserved.