Network security is a complex topic. Organizations need not only consider the actual efficiency of stopping potential cyber-attacks, but also the actual cost of doing so. In this regards, Extreme Fabric Connect is the way to go and here’s why!
With most data breaches starting at end-points, companies and organizations need granular control over users and end devices, as well consistent policies across the entire network. This means that, as our IT environment becomes more and more complex, the need for streamlining security, monitoring and incident response processes grows bigger than ever. Unfortunately, the lack of or insufficient level of automation is something that IT teams in many modern organizations are struggling with.
So the question is: how to enhance network security, without making it more complex? Let’s see how Extreme Fabric Connect addresses that.
More security and less complexity – automatically!
In fabric networks, user attachment can be fully automated using a Network Access Control solution, or NAC in short. Extreme Fabric Connect, deployed together with a policy engine and a NAC – for example ExtremeControl – leverages fine-grained authentication and authorization to create a full network service automation with very effective policy enforcement. This solution allows dynamic mapping of both user to segment and network policy to user.
How does it work precisely? Let’s say we plug a laptop into any port on a fabric switch.
- The switch automatically triggers an authentication request.
- ExtremeControl matches endpoints with attributes, such as user, role, device, time, location, vulnerability, or access type, to create a contextual identity.
- User or end-device is authenticated, dynamically assigned a VLAN or I-SID, as well as a role-based policy.
- Failed or suspect hosts are completely isolated and can be mapped to quarantined or remediation zones.
What’s very important here, these role based identities follow the users dynamically, no matter from where or how they connect to the network.
What does it mean for your organization?
One big advantage for the customers is that the subject-specific, private networks can be established without manual provisioning. Created only at the edge, segments are automatically distributed throughout the network, eliminating error-prone and time-consuming manual configuration practices.
Customers who have combined Extreme Fabric Connect with a policy engine and NAC also appreciate the enhanced security posture. For example, setting granular policies and scaling them across the network automatically makes it easier for them to comply to internal policies and external regulations. With just one click, they can enforce context-driven policies across devices for QoS, bandwidth and other parameters. IoT onboarding and guest administration can be done even by non-technical staff, freeing precious time and resources in the IT budget.
Authenticating devices and controlling what resources they have access to through both policy and segmentation AND eliminating vulnerability due to a configuration error – it all creates a true zero-trust environment which is critical for today’s complex network environment.
But don’t just take our word for it – hear it from our customers! For example, Cordaan, one of the largest healthcare providers in the Netherlands, needed to manage and secure an expanding number of network devices and services, as well as advanced medical IoT equipment. With Fabric Connect, adding new devices and services to Cordaan's distributed network is now automated. In fact, auto-configuration of the devices and persons on the network helped to lower the reliance on IT specialists to run, maintain, and troubleshoot the network.
Cordaan Group – read the full Customer story
This is it!
We have now concluded our mini-series of articles called Exploring the Fantastic Fabric. Feel free to check the previous entries in our series, in case you’ve missed them:
Has Extreme Fabric Connect caught your attention? Would you like to explore the solution in more technical detail? Whether you are looking for a quote, demo, or planning advice for upgrading your network, click the button below and get in touch with us! 👇