Extreme Networks Inc. announced a new technology solution designed to protect critical network infrastructure.
The solution aims to protect critical data in various situations, with a strong emphasis on security in the supply chain environment.
Extreme Trusted Delivery is considered a carrier-grade solution that protects critical network infrastructure and ensures that it performs as intended without interference, regardless of location.
The company says it aims to help secure networks at remote and unattended cellular edge sites, as well as in colocation and data center environments where access to shared facilities is a potential concern.
With supply chain security now more critical than ever with the adoption of hybrid work and technology, Extreme Networks says advanced technology is needed to meet the demands.
New technology allows network administrators to validate hardware components, boot processes and operating system (OS) throughout the device lifecycle without disrupting device functionality and therefore mitigating risk supply chain cyberattacks.
With the new technology, the company says it will add increased simplicity to hardware validation.
It uses a measured start, an anti-tamper mechanism that gives operators the ability to validate hardware and remote start processes without shutting down the device.
This saves time and resources and avoids unnecessary downtime. The implementation of measured boot is enabled by a microcontroller-based hardware root of trust (HWRoT) in conjunction with a Trusted Platform Module (TPM).
Additionally, with remote attestation, the process provides increased verification that the device is performing as intended by enabling a trusted arbiter option and continuous validation at the binary level.
According to Brad Casemore, IDC vice president of research for data centers and multicloud networks, the increase in sophisticated cyber attacks targeting supply chains justifies the need for innovative solutions and believes that this new technology will help companies prevent long-term damage.
“Attacks on supply chains are increasingly frequent and sophisticated. As a result, tremendous value is derived from the ability to verify the performance and safety of a device, at any time, without the need to stop a service or send a technician to a remote location. With Trusted Delivery, Extreme takes steps to help customers ensure their IT infrastructure investments are protected, strengthening the reliability and security of devices throughout their lifecycle.
Dan DeBacker, vice president of product management and service provider engineering at Extreme Networks, agrees, saying the new technology is a step in the right direction for the future of corporate security. supply chain and network.
“Our goal is to make managing network security as easy as possible for our customers. By giving them the ability to keep devices running normally without disrupting service or running expensive trucks, we can solve one of their biggest problems, ”he says.
“Ensuring the security of our solutions is an ongoing effort and one of our most important roles as an end-to-end network infrastructure provider. “