IoT security solution makes protecting edge devices easy

February 08, 2019 // By Rich Pell
Networking company Extreme Networks (San Jose, CA) has announced the general availability of what it says is a simple security solution to help organizations secure unsecured IoT devices.

Able to be deployed on any network, the Defender for IoT solution, says the company, is so easy to use that even non-technical staff at schools, hospitals, retailers, and hospitality venues can use it to isolate and protect both wired and wireless IoT devices from cyberattacks.

"Businesses are extracting so much value from the IoT revolution that it's easy to see why deployments are happening fast, and security should not be viewed as an impediment to that," says Mike Leibovitz, Senior Director of Product Management and Strategy, Extreme Networks. "With Defender for IoT, our goal is not only comprehensive security, but delivering it in a way that is simple and accessible to everyday employees to ensure business productivity is not affected by security protocol."

Currently, says the company, IoT devices present two major security flaws for businesses today: Most lack embedded security since they were built to run on private networks where the assumption was it was tightly controlled and device-level security wasn't required; and they are typically deployed in a flat or unsegmented network so that if breached, the attacker can gain access to sensitive areas of the network.

Defender for IoT, part of the company's Smart OmniEdge network edge solution, is designed to address such challenges by offering the following capabilities:

  • IoT security without the complexity: Defender for IoT is simple to deploy and easy to maintain. Users simply plug the Defender Adapter into an Ethernet port, and run the associated application. The Defender application learns the typical traffic patterns of network devices, and dynamically generates a security policy that locks down what a device communicates with and how it can communicate, automating edge network security for the enterprise. Once initial device profiles have been dynamically generated, non-technical staff can easily place the adapter between the device and the network and apply the appropriate security profile using a simple drop-down menu.
  • Segmentation and isolation of IoT devices: With

Vous êtes certain ?

Si vous désactivez les cookies, vous ne pouvez plus naviguer sur le site.

Vous allez être rediriger vers Google.