Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Extreme Networks Looks to Protect Enterprises From IoT Security Risks

    By
    Sean Michael Kerner
    -
    February 4, 2019
    Share
    Facebook
    Twitter
    Linkedin
      Extreme Networks Defender for IoT

      Extreme Networks announced its Defender for IoT technology on Feb. 4, providing enterprises with a network-level platform for IoT security.

      Defending against risks from rogue or unmanaged internet of things (IoT) devices that might be present on an enterprise network is no trivial task. The Extreme Networks Defender for IoT can plug into an existing network and is able to learn and monitor device behavior and then automatically generate security policy to defend against malicious activities.

      “Defender enables companies to deploy IoT security for wired devices without having to worry about the underlying network infrastructure, in a compact, unified offering,” Camille Campbell, product marketing manager at Extreme Networks, told eWEEK. “The Defender Adapter is deployed as an overlay and sits between the IoT device and the network to monitor traffic and enforce traffic profiles with full Layer 2-7 visibility.”

      There are a number of different ways that the Extreme Networks Defender for IoT offering can be deployed. Campbell explained that Defender for IoT is a value-add application that is deployable on the ExtremeCloud Appliance. The ExtremeCloud Appliance delivers management and orchestration for Extreme’s wired, wireless, and IoT solution, and is a core element of Extreme Networks Smart OmniEdge platform.

      Additionally, organizations can make use of the ExtremeMobility AP3912 Wall Jack to benefit from the Defender for IoT offering. Campbell said that the ExtremeMobility AP3912 is an existing wireless access point within the Extreme Networks mobility portfolio.

      “As part of the Defender for IoT solution, it along with the Defender Adapter, monitors traffic to and from the IoT device with L2-7 visibility, enforcing the security profiles which have been defined in the Defender Application,” she said. “The AP3912i is offered as a 3 Port Defender, with optional support for connectivity and protection of Wi-Fi capable devices.”  

      How It Works

      Both the Defender Adapter and the 3912 Wall Jack AP offer an integrated Bluetooth Low Energy (BTLE) radio for extended connectivity to IoT sensors and devices.  Campbell said that the radio includes support for Thread and other higher level IoT protocols that support sensor networks and smart building automation. An integrated iBeacon can be used for locating critical assets.

      Defender for IoT can be first connected to a network in learning mode in order to understand what the normal activity is for a given network. Campbell explained that in learning mode, the Adapter/AP then mirrors traffic to the Defender Application so that the application learns its normal operating behavior, including what applications are used. 

      “When adequate time has passed in this mode, mirroring can be stopped, and the traffic profile is dynamically generated,” Campbell said. “The policy that is created can then be used as-is, or modified before being applied to the device and devices of the same type.”

      She added that once assigned a policy, the device’s network interaction will be constrained to the characteristics of the policy. A core element of the Defender for IoT is its ability to segment IoT devices into what Extreme Networks refers to as secure network zones. Campbell said that a secure zone could be a VLAN , but preferably it would be either an IPSec tunnel, or in the case that Defender is being deployed with an Extreme Fabric Connect network, it could also be a Fabric Connect hyper-segment.

      “The network segments originate at the Defender Adapter or the Wall Jack AP and terminate in the Data Center at the ExtremeCloud Appliance,” Campbell explained.

      Looking forward, Campbell said that Extreme Networks is looking at continuing to expand Defender for IoT with the addition of advanced security analytics.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×