A highly scalable database designed to capture real-time log event and network flow data, revealing the footprints of would be attackers. Extreme Networks ExtremeSecurity SIEM is an enterprise solution that […]
A highly scalable database designed to capture real-time log event and network flow data, revealing the footprints of would be attackers. Extreme Networks ExtremeSecurity SIEM is an enterprise solution that consolidates log source event data from thousands of devices distributed across a network, storing every activity in its raw form, and then performing immediate correlation activities to distinguish the real threats from false positives. It also captures real-time Layer-4 network flow data and, more uniquely, Layer-7 application payloads, using deep packet inspection technology. An intuitive user interface shared across all Security Analytics components helps IT personnel quickly identify and remediate network attacks by rank, ordering hundreds of alerts and patterns of anomalous activity into a drastically reduced number of offenses warranting further investigation.
Extreme Networks ExtremeSecurity Vulnerability Manager helps security teams identify resource configuration issues, understand the impact of software patching schedules, coordinate with intrusion prevention systems to block open connections, and establish continuous monitoring of systems that can’t otherwise be remediated all from a single, integrated dashboard. By correlating vulnerability data with SIEM event and threat analysis, Risk Manager device configuration and network traffic analysis, and external databases, Vulnerability Manager can help organizations build actionable plans for deploying their often constrained IT staffing resources. Extreme Networks ExtremeSecurity Security Risk Manager automates risk management functions in mission critical areas, helping security professionals safeguard their organizations against an ever-growing spectrum of attacks, vulnerabilities and compliance mandates.
Extreme Networks ExtremeSecurity — Intrusion Prevention System
Provides exceptional functionality by locating, containing, and removing the source of the attack from the network. ExtremeSecurity Threat Protection platform is designed to protect your business critical network infrastructure through a unique combination of visibility and control and prevention. Extreme extends the abilities of traditional intrusion prevention systems by offering a next generation solution that provides network security professionals with complete security, visibility and control over their network. Extreme Networks ExtremeSecurity Threat Protection helps reduce cost and complexity by consolidating point solutions into a single, extensible network security platform. And by controlling and eliminating non critical, high bandwidth activity, organizations can achieve additional cost savings within the infrastructure. ExtremeSecurity Threat Protection is an integrated solution that can help you accomplish all of these tasks.
Extreme Networks Security Analytics G2 Risk Manager
ExtremeSecurity Analytics Risk Manager is an integral component of a complete security intelligence solution that can help security professionals stay ahead of advanced threats. Extreme Networks ExtremeSecurity Analytics Risk Manager automates risk management functions in mission critical areas, helping security professionals safeguard their organizations against an ever-growing spectrum of attacks, vulnerabilities and compliance mandates. The ability to proactively quantify risk from vulnerabilities, configuration errors, anomalous network activity and threats can help organizations prevent exploits that target high value assets and data. ExtremeSecurity Analytics Risk Manager correlates network topology information with data from ExtremeSecurity SIEM including asset configurations, vulnerabilities, network events and flow patterns.
Extreme Networks X-Force Threat Intelligence
You can extend these comprehensive analytics still further, using X-Force Threat Intelligence to augment security analytics capabilities by feeding its proprietary threat insights, including data on malware hosts, spam sources and anonymous proxies. Combining worldwide intelligence from X-Force with Security Information and Event Management (SIEM), log management, anomaly detection, and configuration and vulnerability management capabilities provides users with additional context on security incidents, helping prioritization of incidents requiring examination-and enabling prevention or minimize damaging attacks. Security Analytics portfolio, an integrated family of products that helps detect and defend against threats by applying sophisticated analytics to more types of data. In doing so, the platform helps identify high priority incidents that might otherwise get lost in the noise.
Extreme Networks Vulnerability Manager
ExtremeSecurity Vulnerability Manager can help organizations minimize the chances of a network security breach by using a proactive approach to finding security weaknesses and minimizing potential risks. It uses a proven vulnerability scanner to collect up to date results, but unlike other solutions, it leverages the capabilities of ExtremeSecurity Analytics platform to present the data within the overall context of the network usage, security and threat posture. Security Vulnerability Manager identifies key security weaknesses to help thwart future attacks. Extreme Networks ExtremeSecurity Vulnerability Manager identifies key security weaknesses to help thwart future attacks. ExtremeSecurity Vulnerability Manager can help organizations minimize the chances of a network security breach by using a proactive approach to finding security weaknesses and minimizing potential risks.
Extreme Networks Log Manager
Extreme Networks ExtremeSecurity Analytics Log Management analyzes all the data from various network and security devices, servers and operating systems, applications, and a wide assortment of endpoints to provide near real-time visibility into developing threats and to meet continuous compliance monitoring requirements. With the ExtremeSecurity Analytics Log Management flexible query engine, diverse log data is aggregated and correlated into actionable IT operations and security forensics to help identify patterns of attack, anomalies, access and use of confidential data and insider threats. Organizations looking to collect, analyze, archive and securely store large volumes of network and security event logs need a high performance, easy-to-use, and comprehensive log management system. ExtremeSecurity Analytics Log Management analyzes all the data from various network and security devices, servers and operating systems, applications, and a wide assortment of endpoints to provide near real-time visibility into developing threats and to meet continuous compliance monitoring requirements.
Intelligent application visibility — Purview application identification uses deep packet inspection (DPI) to provide a rich analytical framework and granular controls for private (SAP, SOA traffic, Exchange, SQL etc.) and public Cloud (Salesforce, Google, Email, YouTube, P2P, Facebook, Twitter, file sharing, etc.) applications essential to your business. This enables IT and other Lines of Business to determine which applications or websites are being accessed, the consumed bandwidth and other statistics on business critical applications versus non business critical applications. Proactive security and compliance — provides IT with the ability to monitor and restrict application usage and website access based on specific parameters.
For example, a known web browser version that poses security risks could be restricted. Purview is the very FIRST and ONLY — patent pending — solution that bridges Network/Security Management with comprehensive Business Analytics. With better network planning — understand the impact of deployed applications on the network. This provides the data necessary to plan network expansions before user complain.
Multi site management — ExtremeCloud provides centralized management of multiple virtual or physical sites, consolidating management information from across the entire network for a global and consistent experience. New services or policies are defined in just a few clicks and quickly deployed across one or more locations, or simply in a specific sub section of your network, making it simple for you to test and deploy globally new application driven services. Security is built into the entire fabric of ExtremeCloud and the devices that it manages.
During the manufacturing process of cloud-enabled network devices, a unique certificate is installed along with the cloud discovery services to prevent man in the middle attacks and preserve the authenticity and confidentiality of communications between your wired or wireless network device and ExtremeCloud. Web-based centralized management — ExtremeCloud provides network administrators with a centralized web-based interface designed to easily manage both infrastructure and services. This graphical interface allows network administrators to configure, enable, or disable each device or group of devices.
Open, standards-based ExtremeControl Connect SDN controller providing simple, fast, and smart automation and orchestration. The ExtremeControl Connect SDN solution accelerates application innovation and reduces risks for the entire network, including wireless, campus and data center. We do this through a modular, open and standards-based development environment that integrates with existing infrastructure and avoids architecture lock-in. One open and standards-based architecture that won’t require vendor lock-in or additional investment to realize the full potential of SDN.
A simple development platform for innovation that makes it easy for any organization to deploy SDN solutions regardless of size or skill level. Investment protection as our SDN solutions not only integrate with other Extreme Networks solutions but also support multi-vendor environments. Value-added network services like Purview, NAC, NetSight, OneFabric Connect, etc. that provide functionality beyond SDN. A comprehensive solution for the whole network including wireless, campus, core and data center. Unique core-flow technology that provides the industry’s most scalable flow-aware data plane.
Extreme Networks comprehensive approach preserves the integrity of the open API provided by ODL while extending data center orchestration, automation and provisioning to the entire network under a single pane of glass. Extreme Networks’ simple, fast and smart SDN platform tightly integrates with existing and multi-vendor hardware and software network environments, preserving customer investments and avoiding vendor lock in. Backward compatibility is maintained with multi-vendor network infrastructure that conforms to the OpenFlow standard and other open APIs.
Extreme Networks OpenDaylight based API, Software Development Kit (SDK) and developer community will enable customers to evolve the network to keep pace with emerging security, wireless, and converged SDN infrastructure. The result is a simpler development platform that avoids the feature and capability limitations of other open SDN models — many of which are really only truly applicable to new or ‘greenfield’ networking implementations.
It is a professional service delivered through a combination of middleware and integration services that interact with the Extreme Networks OneFabric Connect addresses the simultaneous needs for security, virtualization, manageability, mobility and agility in today ́s networks Center (leveraging the Netsight Management Suite) from Extreme Networks. It provides APIs to integrate OneFabric Connect addresses the simultaneous needs for security, virtualization, manageability, mobility and agility in today ́s networks Center (Netsight, Mobile IAM and NAC) with other IT solutions, management systems and databases (CMDB’s, etc.), MDM solutions, NG Firewalls, Web Filtering solutions etc.
It enhances the value of OneFabric Control Center with deeper visibility into device data — augmented with asset info, contact info, device details, phone number etc. It provides automation and control — device identification and location tracking, reporting back to other IT systems and automatically assign policies managed by IT systems inside or outside the network management domain.