Extreme Networks Showcases Coordinated Security Architecture Addressing the Full Life-Cycle of Users and Devices on the Network at RSA


SANTA CLARA, Calif., Feb. 6 // -- Extreme Networks, Inc., (NASDAQ:EXTR), is demonstrating a powerful network security solution at the RSA Conference, this week in San Francisco. At its booth, #2344, Extreme Networks(R) is for the first time demonstrating its Coordinated Security Architecture, one that allows network managers to gain control and enforcement of users and devices throughout every stage of connectivity lifecycle.

Extreme Networks Coordinated Security Architecture addresses the lifecycle of a device or user accessing a network by integrating pre-admission device testing, quarantine and remediation, with post admission control, which includes policy enforcement with behavioral monitoring. This security implementation brings together a full-featured Network Access Control (NAC) solution, strong user authentication, and integrated threat containment tools that support wired, wireless and remotely connected users and devices.

"The continued evolution of threats means that security solutions must stay ahead of attacks, working as one coordinated system to keep the network secure and highly available," said Suresh Gopalakrishnan, vice president and general manager of the emerging products business unit at Extreme Networks. "Our Coordinated Security Architecture truly demonstrates the direction that security technology has to take in order to allow customers to automate and simplify how they secure their networks."

Advantages of the Coordinated Security Architecture:
o Flexible and powerful pre-admission testing to keep out-of-policy
devices from entering the network.
o Powerful and flexible post network admission monitoring and control
appliance that continuously monitors all traffic on the network instead
of traffic sampling which is common with sFlow-based systems.
o Works with multi-vendor networks and requires no specific switching
hardware or network upgrades.
o When combined with an Extreme Networks switching infrastructure,
customers can access additional threat detection and mitigation
capabilities.

The Coordinated Security Architecture leverages open APIs and Extreme Networks Sentriant(TM) and Sentriant AG appliances to address the full access life cycle of users and devices on the network.

Extreme Networks, Inc.

Extreme Networks designs, builds, and installs Ethernet infrastructure solutions that solve the toughest business communications challenges. Our commitment to open networking sets us apart from the alternatives by delivering meaningful insight and unprecedented control to applications and services. We believe openness is the best foundation for growth, freedom, flexibility, and choice. We focus on enterprises and service providers who demand high performance, converged networks that support voice, video and data, over a wired and wireless infrastructure.

Extreme Networks and Sentriant are either registered trademarks or trademarks of Extreme Networks, Inc. in the United States and/or other countries.

Source: Extreme Networks, Inc.

Web site: www.extremenetworks.com/

All Topics