Helping to secure the Everywhere Perimeter

Avaya is announcing a new foundation approach to network security that aims to reduce the growing number of breaches compromising data integrity and privacy. The new approach will enable organisations to create stealth, hyper-segments within their networks that are invisible to hackers and provide the elasticity to protect the ‘everywhere perimeter’.

  • 7 years ago Posted in
While trends such as mobility, IoT and cloud computing promise enormous opportunity and benefit, they also make it nearly impossible to determine the location of organisation’s network boundaries and thus, real and potential security threats stymie progress. The reality today is that an organisation’s network perimeter is now everywhere, making it even more critical that security is a core component of the network architecture that is capable of extending to any potential access point - whether that’s in the cloud, a mobile device or a sensor unit in a HVAC system.

 

Hyper-segmentation — the ability to create secure “swim lanes” within the overall network based on a particular function, location or service — offers a means of addressing security breaches by limiting how far a hacker can go once they gain access. But, while IT professionals agree that end-to-end segmentation is essential for security (see related research), few currently deploy such a strategy for various reasons, including it’s too complex, too resource intensive or don’t believe it’s possible.

 

Avaya Networking offers a different approach to securing the “everywhere perimeter” that comprises three synergistic capabilities: 

·         Hyper-Segmentation:  The ability to create stealth segments that span the entire network.

·         Native Stealth: The characteristic of a hyper-segment that is invisible to hackers.

·         Automated Elasticity: The capability to create and remove hyper-segments automatically

Avaya’s capabilities start at the foundational layer --a shared control plane — to automatically manage hyper-segments seamlessly and invisibly across the organization. Avaya SDN and identity technologies eliminate the tradeoff between security and complexity by automating the onboarding and access of devices, users, switches, and servers to make protecting and managing every-where access effortless.

 

Avaya’s capabilities are comprised of the following Avaya products:

      Fabric Connect, Fabric Attach, and Fabric Extend (software feature on Avaya Switches)

      Identity Engines (network access software)

      Open Networking Adapter (open server software on a pocket-sized appliance)

      SDN Controller (software delivered today on a server tomorrow bundled with Avaya Fabric Orchestrator delivered on a server)

      WLAN 9100 (wireless controller software delivered on Avaya access points)

      Deployment and management services

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...