Extreme Announces Defender for IoT Security Solution

IOT News

Extreme-Announces-Defender-for-IoT-Security-Solution Extreme Announces Defender for IoT Security SolutionIoT devices are growing at an explosive rate, proliferating in every industry, but with this uncontrolled growth also comes risk and threat vulnerabilities. As per recent IoT data and media reports, IoT related attacks have increased 600 percent from 2016 to 2017. With this level of threat and IoT attack surface in mind, to assist enterprise networks with security issues, Extreme Networks, Inc., a networking company based in San Jose, California, in a recent press release statement on Monday, Feb. 4th 2019, announced the general availability of Extreme Networks’ Defender for IoT, a simplified security solution to assist organizations and enterprises both large and small to secure their unsecured IoT devices. Defender for IoT security solution comes with universal deployment capability and has a very simplified interface, to ensure usability by even non-technical staff at hospitals, schools, retailers and hospitality venues. The staff can easily isolate and protect both wired and wireless IoT devices from cyber attacks, with Extreme’s solution.

The two major flaws or security vulnerabilities IoT devices come with are lack embedded security and flat or unsegmented network deployments. The former arises as the devices were never built to run on public networks, but were only built for private networks with the assumption that these private networks are secured and tightly controlled so that device-level security wasn’t needed. Manufacturers didn’t even consider the possibility of these private enterprise network devices seeing the public network limelight, thus they all come with hardcoded passwords and lack basic anti-virus or firewall capabilities. The latter arises from the fact that these IoT devices are generally deployed in a flat or unsegmented network. If an attacker or intruder breaks through and breaches these networks, the attacker/intruder can easily gain access to sensitive areas of the network.