A highly scalable database designed to capture real-time log event and network flow data, revealing the footprints of would be attackers. Extreme Networks ExtremeSecurity SIEM is an enterprise solution that consolidates log source event data from thousands of devices distributed across a network, storing every activity in its raw form, and then performing immediate correlation activities to distinguish the real threats from false positives. It also captures real-time Layer-4 network flow data and, more uniquely, Layer-7 application payloads, using deep packet inspection technology. An intuitive user interface shared across all Security Analytics components helps IT personnel quickly identify and remediate network attacks by rank, ordering hundreds of alerts and patterns of anomalous activity into a drastically reduced number of offenses warranting further investigation.
Extreme Networks ExtremeSecurity Vulnerability Manager helps security teams identify resource configuration issues, understand the impact of software patching schedules, coordinate with intrusion prevention systems to block open connections, and establish continuous monitoring of systems that can’t otherwise be remediated all from a single, integrated dashboard. By correlating vulnerability data with SIEM event and threat analysis, Risk Manager device configuration and network traffic analysis, and external databases, Vulnerability Manager can help organizations build actionable plans for deploying their often constrained IT staffing resources. Extreme Networks ExtremeSecurity Security Risk Manager automates risk management functions in mission critical areas, helping security professionals safeguard their organizations against an ever-growing spectrum of attacks, vulnerabilities and compliance mandates.
Extreme Networks ExtremeSecurity — Intrusion Prevention System
Provides exceptional functionality by locating, containing, and removing the source of the attack from the network. ExtremeSecurity Threat Protection platform is designed to protect your business critical network infrastructure through a unique combination of visibility and control and prevention. Extreme extends the abilities of traditional intrusion prevention systems by offering a next generation solution that provides network security professionals with complete security, visibility and control over their network. Extreme Networks ExtremeSecurity Threat Protection helps reduce cost and complexity by consolidating point solutions into a single, extensible network security platform. And by controlling and eliminating non critical, high bandwidth activity, organizations can achieve additional cost savings within the infrastructure. ExtremeSecurity Threat Protection is an integrated solution that can help you accomplish all of these tasks.
Extreme Networks Security Analytics G2 Risk Manager
ExtremeSecurity Analytics Risk Manager is an integral component of a complete security intelligence solution that can help security professionals stay ahead of advanced threats. Extreme Networks ExtremeSecurity Analytics Risk Manager automates risk management functions in mission critical areas, helping security professionals safeguard their organizations against an ever-growing spectrum of attacks, vulnerabilities and compliance mandates. The ability to proactively quantify risk from vulnerabilities, configuration errors, anomalous network activity and threats can help organizations prevent exploits that target high value assets and data. ExtremeSecurity Analytics Risk Manager correlates network topology information with data from ExtremeSecurity SIEM including asset configurations, vulnerabilities, network events and flow patterns.
Extreme Networks X-Force Threat Intelligence
You can extend these comprehensive analytics still further, using X-Force Threat Intelligence to augment security analytics capabilities by feeding its proprietary threat insights, including data on malware hosts, spam sources and anonymous proxies. Combining worldwide intelligence from X-Force with Security Information and Event Management (SIEM), log management, anomaly detection, and configuration and vulnerability management capabilities provides users with additional context on security incidents, helping prioritization of incidents requiring examination-and enabling prevention or minimize damaging attacks. Security Analytics portfolio, an integrated family of products that helps detect and defend against threats by applying sophisticated analytics to more types of data. In doing so, the platform helps identify high priority incidents that might otherwise get lost in the noise.
Extreme Networks Vulnerability Manager
ExtremeSecurity Vulnerability Manager can help organizations minimize the chances of a network security breach by using a proactive approach to finding security weaknesses and minimizing potential risks. It uses a proven vulnerability scanner to collect up to date results, but unlike other solutions, it leverages the capabilities of ExtremeSecurity Analytics platform to present the data within the overall context of the network usage, security and threat posture. Security Vulnerability Manager identifies key security weaknesses to help thwart future attacks. Extreme Networks ExtremeSecurity Vulnerability Manager identifies key security weaknesses to help thwart future attacks. ExtremeSecurity Vulnerability Manager can help organizations minimize the chances of a network security breach by using a proactive approach to finding security weaknesses and minimizing potential risks.
Extreme Networks Log Manager
Extreme Networks ExtremeSecurity Analytics Log Management analyzes all the data from various network and security devices, servers and operating systems, applications, and a wide assortment of endpoints to provide near real-time visibility into developing threats and to meet continuous compliance monitoring requirements. With the ExtremeSecurity Analytics Log Management flexible query engine, diverse log data is aggregated and correlated into actionable IT operations and security forensics to help identify patterns of attack, anomalies, access and use of confidential data and insider threats. Organizations looking to collect, analyze, archive and securely store large volumes of network and security event logs need a high performance, easy-to-use, and comprehensive log management system. ExtremeSecurity Analytics Log Management analyzes all the data from various network and security devices, servers and operating systems, applications, and a wide assortment of endpoints to provide near real-time visibility into developing threats and to meet continuous compliance monitoring requirements.