Limiting how much of the network is visible, and hardened that which is, goes a long way to reducing the opportunities presented to cyber-attackers. Let’s see how Extreme Fabric Connect handles that!
Stealth topology means an invisible network
What does it mean for your organization?
Moreover, Service Elasticity simplifies provisioning, so it’s easier to protect IoT devices. IoT devices are often unattended and need to be deployed in real-time, without requiring an IT intervention. Extreme Fabric Connect removes the risk of a back-door entry point to the network, which can happen in a manually configured network.
We are now working with dynamic IP addresses via Dynamic Host Configuration Protocol. It is not only smoother, but also much more secure.
Karin Doguet, Chief Information Office, Université libre de Bruxelles