- 18 March 2008 11:58
Extreme Networks boosts security for converged voice and data networks with new tools
MELBOURNE, March 18, 2008 – Extreme Networks (Nasdaq: EXTR) today announced enhancements to its network solutions that provide behaviour-based rules to protect IP Telephony and VoIP traffic.
These security rules help mitigate the threat of malicious users and hackers who are actively trying to exploit vulnerabilities and breach the IP communications network. Based on these rules, users or devices that demonstrate destructive behaviour when entering the network can rapidly be addressed to preserve the quality of voice communications.
“The amount of voice traffic carried on the converged network is expanding as is the risk exposure to threats,” said Suresh Gopalakrishnan, vice president and general manager for the Emerging Product group at Extreme Networks. “The IP Telephony equipment suppliers have done their part to secure communications but behaviour of users and malicious applications on the network edge can still impact VoIP performance. Extreme Networks has added behaviour-based rules to our Sentriant security appliance to help negate these vulnerabilities and make converged networks stable, secure and reliable.”
Extreme Networks, an Avaya Global Alliance Partner, is adding IP Telephony security rules that focus protection around voice traffic traversing a unified communications network. A packaged set of rules is available now for Extreme Networks Sentriant security appliance. These rules help to simplify management tasks and better protect VoIP gateways, SIP servers and VoIP phones.
“Clearly, the innovative security rules from Extreme Networks are designed to further enhance converged solutions and deliver better voice quality in a unified communications environment,” said Eric Rossman, vice president, developer relations and technical alliances, Avaya. “Protecting converged communications and improving the voice application is key in providing high quality converged communications to businesses.”
Extreme Networks VoIP security rules take into account traditional traffic patterns occurring between IP phones and call servers, with protection mechanisms that automatically trigger if a significant amount of traffic anomalies are seen.
More information about the Sentriant security appliance is available online: http://www.extremenetworks.com/libraries/products/DSSentriant_1021.pdf
Extreme Networks, Inc.
Extreme Networks designs, builds, and installs Ethernet infrastructure solutions that solve the toughest business communications challenges. The Company’s commitment to open networking sets it apart from the alternatives by delivering meaningful insight and unprecedented control to applications and services. Extreme Networks believes openness is the best foundation for growth, freedom, flexibility, and choice. Extreme Networks focuses on enterprises and service providers who demand high performance, converged networks that support voice, video and data, over a wired and wireless infrastructure. For more information, visit: http://www.extremenetworks.com
Except for the historical information contained herein, the matters set forth in this press release, including without limitation statements as to features and benefits of the Sentriant product are forward-looking statements within the meaning of the "safe harbor" provisions of the Private Securities Litigation Reform Act of 1995. These forward-looking statements speak only as of the date. Because such statements deal with future events, they are subject to risks and uncertainties, including network design and actual results of use of the product in different environments. We undertake no obligation to update the forward-looking information in this release. Other important factors which could cause actual results to differ materially are contained in the Company's 10-Qs and 10-Ks which are on file with the Securities and Exchange Commission. http://www.sec.gov
For more information, contact:
Extreme Networks Andrew McBride +61-3-9694 4494 or +61 (0) 434 520 677 firstname.lastname@example.org
Sign up now »
Modernizing Security for the Small and Mid-Sized Business – Recommendations for 2013 (Sponsored by McAfee)
As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Specifically, email security, web security and secure file sharing should be considered foundational security capabilities for every small and mid-sized business, in addition to anti-virus and firewalls.
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
- Aurora hackers said to have accessed law enforcement targets
- Microsoft may be scanning your Skype messages
- Researchers find critical vulnerabilities in popular game engines
- Pentagon clearance for iOS could open even more doors for Apple in the private sector
- Digital strongboxes won't solve whistleblower problem for journalists
- Coping with brand management: Diageo’s story
- IBM launches Watson customer service smart bot
- Commonwealth Bank leads four Australian brands in the 2013 top 100 Global brands list
- More Australians are using mobiles to connect to social media: report
- Oo.com.au partners with Responsys to overhaul digital customer strategy