Extreme Ensures Security, Availability Across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery


Eliminates Unnecessary Network Downtime, Creates Additional Layer of Certainty in Deploying New Infrastructure

SAN JOSE, Calif., Dec. 16, 2021 /PRNewswire/ — Extreme Networks, Inc. (NASDAQ: EXTR), a cloud-driven networking company, today announced Extreme Trusted Delivery, a carrier-grade solution designed to protect critical network infrastructure and ensure it is performing as anticipated without interference, regardless of location. Trusted Delivery protects key service delivery infrastructure at remote and unattended cellular edge sites, as well within co-location and data center environments where shared facility access is a potential concern.

Extreme Networks Logo (PRNewsFoto/Extreme Networks) (PRNewsFoto/Extreme Networks) (PRNewsfoto/Extreme Networks, Inc.)

Extreme Networks Logo (PRNewsFoto/Extreme Networks) (PRNewsFoto/Extreme Networks) (PRNewsfoto/Extreme Networks, Inc.)

With cyberattacks on the rise, supply chain security is more critical than ever, requiring state-of-the-art network technology from end to end. Trusted Delivery enables network administrators to validate hardware components, boot processes, and the operating system (OS) throughout the device lifecycle – without disrupting device functionality – mitigating the risk of supply chain cyberattacks.

Key Benefits:

  • Secure Foundation for Future Deployments: With Trusted Delivery, Extreme delivers an additional layer of certainty for service providers that are beginning to move away from legacy solutions and ensures a foundation of secure, validated infrastructure to support new networks. Available today across the Extreme 8000 Series, including the Extreme 8520 and Extreme 8720 data center and cellular edge leaf and spine switches, Trusted Delivery provides mechanisms for verifying device security and performance during operation, enabling service providers to deploy new infrastructure with confidence.

  • Increased Simplicity in Hardware Validation: Measured boot, an anti-temper mechanism, gives operators the ability to validate hardware and boot processes remotely without shutting the device down. This saves time and resources and prevents unnecessary service disruptions. Measured boot implementation is enabled by a microcontroller-based hardware root of trust (HWRoT) in conjunction with a Trusted Platform Module (TPM)….

Source…