Wish to eliminate unnecessary network downtime and create an additional layer of certainty when deploying new infrastructure? Extreme got you covered – you can count on our Trusted Delivery!
Cyberattacks on supply chains are growing both in frequency and sophistication, requiring state-of-the-art network technology, end-to-end. To mitigate this risk for service providers that are beginning to move away from legacy solutions, Extreme came up with Trusted Delivery – carrier-grade solution designed to protect critical infrastructure and ensure it’s performing as anticipated without interference.
Available today across the ExtremeSwitching 8000 Series, including the Extreme 8520 and Extreme 8720 switches, Trusted Delivery protects key service delivery infrastructure at remote and unattended cellular edge sites, as well as within co-location and data center environments where shared facility access is a potential concern.
How does it work?
The solution provides mechanisms for verifying device security and performance during operation, enabling service providers to deploy new infrastructure with confidence.
Measured boot, an anti-tamper mechanism enables network administrators to remotely validate hardware components, boot processes, and the operating system (OS) throughout the device lifecycle and without disrupting device functionality, which not only helps mitigate the risk of supply chain cyberattacks, but also saves precious time and resources.
Measured boot implementation is enabled by a microcontroller-based hardware root of trust (HWRoT) in conjunction with a Trusted Platform Module (TPM). Additionally, with remote attestation, Extreme delivers increased verification that the device is functioning as expected by enabling an off-box arbiter of trust option and ongoing binary-level validation.
How does it help?
“Attacks on supply chains are growing in frequency and sophistication. As a result, considerable value derives from the ability to verify a device's performance and security, at any time, without the need to shut off a service or to send a technician to a remote location. With Trusted Delivery, Extreme is taking measures to help customers ensure that their investments in IT infrastructure are protected, bolstering the reliability and security of devices throughout their lifecycle”, says Brad Casemore, Research Vice President, Datacenter and Multicloud Networks at IDC.
“Our goal is to make managing network security as easy as possible for our customers. By giving them the ability to ensure devices are functioning normally without interrupting service, or without costly truck rolls, we can address one of their biggest pain points. Ensuring the security of our solutions is a continuous effort and is one of our most important roles as a provider of end-to-end network infrastructure”, Dan DeBacker, Vice President of Service Provider Product Management and Engineering at Extreme Networks adds.