Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Extreme Networks Introduces New IoT Security and Automated Threat Mitigation for the Digital Enterprise

ExtremeAI Security Delivers Advanced Behavioral Analysis, Automated Remediation, and Containment to Defend Against Network-Based Cyber Attacks

Today’s cyber threats, once inside, move laterally across networks to reach their targets, compromising everything in their path. The volume, speed and sophistication of these often-undetected attacks requires a new approach to enterprise network security. Accenture’s 2018 State of Cyber Resilience Report found that 83 percent of respondents believe they need advanced technologies to secure their future, but just 2 in 5 had invested in AI and machine learning technologies. To meet this challenge, Extreme Networks, Inc. announced its ExtremeAI Security application, a new class of network security that leverages artificial intelligence and machine learning to identify and remediate advanced threats against IoT devices.

The convergence of multi-cloud, mobility, and the massive influx of IoT devices in the enterprise expands the attack surface, making it an imperative to deploy advanced security technologies deep inside the network and not just at the perimeter. This explosion of endpoints and network traffic creates complexity and makes it difficult for network administrators and security teams to gain visibility into the chaos through traditional solutions. With IoT devices ranging from million-dollar smart MRI machines to five-dollar sensors, device-level security alone can’t be trusted to secure endpoints. As a result, enterprise security teams are working overtime to keep up, but are often shorthanded due to a lack of trained cybersecurity personnel.

Read More: Affectiva’s Latest $26 Million to Drive the Integration of Emotional Intelligence AI in Safety Systems of Automobiles

ExtremeAI Security delivers deep visibility and detection of malicious traffic, and real-time monitoring of IoT devices for behavioral anomalies, illuminating enterprise networks so attackers have nowhere to hide. Through fully-automated remediation of suspicious devices and traffic, ExtremeAI Security ensures threats are contained without manual intervention, preventing them from moving across the network. Extreme’s powerful traffic analytics and visibility capabilities are embedded in this new security solution, combining the best of enterprise networking with innovations in machine learning to identify and remediate threats.

Key features of ExtremeAI Security include:

  • Behavioral monitoring and baselining: Massively scalable behavioral anomaly detection leverages machine learning to understand typical behavior of IoT devices and automatically trigger alerts when endpoints act in unusual or unexpected ways.
  • Unsupervised learning: A zero-touch, zero-configuration approach makes ExtremeAI Security easy to implement. The advanced machine learning algorithm automatically responds when triggered and mitigates threats. This major innovation is based on advancements in the field of Natural Language Processing.
  • Insights and granular analytics: By leveraging its ExtremeAnalytics™ application – the company’s flagship, end-to-end, analytics application — users can get deep visibility into the lateral movement of malicious traffic and any impact on crucial network services. Through the analytics platform, they can view threats by severity, category, high-risk endpoints and geography.
  • Multi-vendor interoperability and integration: ExtremeAI Security works with all leading threat intelligence feeds, and close integration with Extreme Workflow Composer enables automatic threat mitigation and remediation. The automated ticketing feature integrates with variety of popular IT tools like Slack, Jira, and ServiceNow, and the solution as a whole interoperates with many popular security tools, including existing network taps. This extra layer of security is necessary in today’s changing enterprise IT environment.

Read More: NASA TV Coverage Set for April 17 Cygnus Launch to International Space Station

Related Posts
1 of 40,645

ExtremeAI Security will be generally available in October 2019.

Executive Perspectives

Abby Strong, Vice President of Product Marketing, Extreme Networks
“Security is top of mind for all of our customers. They have seen the devastating impact of data breaches across industries and understand that they need to change the way they view security infrastructure. The ability to stop cyberattacks from moving across networks is an absolute necessity to prevent the types of data breaches that can dramatically harm a business. Extreme’s advancements in both security and machine learning will bring added peace of mind and a much-needed extra layer of security for our customers.”

Fritz Buetikofer, Senior IT Manager, University of Bern
“In the past, we looked at tools that promise to provide visibility into data traffic and pinpoint anomalies. In most cases, it was very time consuming to customize the bells and whistles of these tools so that they were effective and didn’t show too many ‘false positives’ – leaving our IT team to chase after non-issues and potentially exposing our organization to real security risks. In beta tests with ExtremeAI Security, it was immediately clear that Extreme is delivering an outstanding integration of analytics and anomaly detection – as well as device profiling – through the deep integration of its software and hardware capabilities. Even in this very early stage, its easy-to-use dashboard provides us with very precise information about incidents in every ‘marked’ component of our network infrastructure.”

Read More: Melbourne-Based Immersive Tech Studio Create AR Social Experience to Complement Netflix’s New Series

Volker Kull, CTO, BELL Computer-Netzwerke GmbH 
“The irony of cybersecurity today is that many organizations continue to rely on traditional, perimeter-based defenses, despite ever more sophisticated attacks. This is a deceptive security that we must counteract with intelligent technologies. Extreme Networks is at the forefront of a new era of security, offering comprehensive network visibility, traffic analysis and artificial intelligence. We are proud to partner with Extreme to help customers modernize and improve their security environment, so they can confidently address today’s IT challenges.”

Rohit Mehra, Vice President, Network Infrastructure, IDC
“Traditional perimeter defenses alone are no longer enough to stop today’s sophisticated cyberattacks. Enterprises must base their defenses off the idea that they have already been breached and focus their efforts on protecting critical applications and data, while preventing intruders from moving across the network. Extreme’s new capabilities that leverage advanced machine learning will help enhance its automation toolset across its network visibility, analytics and management solutions, enabling enterprises to address their security challenges.”

Read More: AiThority Interview Series with Stuart Brock, Director at Seal Software

3 Comments
  1. erkek fatma Pornosu izle says

    Özel lezbiyen olmaları Porno Videolar online ve sıcak lezbo pussies Web sitemizde
    genç ve güzel lezbiyenler videoları online izleyin 5kporn abanoz stunner.

  2. Copper refining processes says

    Copper scrap importers Copper scrap compounding Scrap metal inventory tracking
    Reliable Copper cable scrap reception, Metal waste reduction, Copper sheet scrap

  3. Copper scrap exporters says

    Copper scrap trading company Copper scrap trading network Scrap metal
    Recycling facilities for Copper cable scrap, Scrap metal material handling, Recycled copper commodities

Leave A Reply

Your email address will not be published.