Tag Archive for: trusted

Extreme : Security and Availability across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery


Headlines around supply chain attacks remain consistent. Those attacks keep on growing. 2020 ended with a blockbuster supply chain attack, namely Solarwinds, and attacks continued well into 2021.

The Identify Theft Resource Center keeps a tap on all publicly known security breaches. By September 30, 2021 the total number of events in comparison to FY 2020 has been exceeded by 17 percent. The trendline continues to point to a record-breaking year for data compromises. You can check over here for more details.

Those security breaches have several material business impacts:

  • Disruption of operation of the supply chain
  • Significant damage to brand and reputation
  • Impact on product safety and integrity
  • Loss of theft of IP
  • Substantial fines and fees

With cyberattacks on the rise, supply chain security is more critical than ever, requiring state-of-the-art network technology from end to end. Trusted Delivery enables network administrators to validate hardware components, boot processes, and the operating system (OS) throughout the device lifecycle – without disrupting device functionality – mitigating the risk of supply chain cyberattacks.

Trusted Delivery – Key Benefits:

  • Secure Foundation for Future Deployments: With Trusted Delivery, Extreme delivers an additional layer of certainty for Service Providers that are beginning to move away from legacy solutions and ensures a foundation of secure, validated infrastructure to support new networks. Available today across the Extreme 8000 Series, including the Extreme 8520 and Extreme 8720 data center and cellular edge leaf and spine switches, Trusted Delivery provides mechanisms for verifying device security and performance during operation, enabling service providers to deploy new infrastructure with confidence.
  • Increased Simplicity in Hardware Validation: Measured boot, an anti-tamper mechanism, gives operators the ability to validate hardware and boot processes remotely without shutting the device down. This saves time and…

Source…

Extreme Ensures Security, Availability Across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery


Eliminates Unnecessary Network Downtime, Creates Additional Layer of Certainty in Deploying New Infrastructure

SAN JOSE, Calif., Dec. 16, 2021 /PRNewswire/ — Extreme Networks, Inc. (NASDAQ: EXTR), a cloud-driven networking company, today announced Extreme Trusted Delivery, a carrier-grade solution designed to protect critical network infrastructure and ensure it is performing as anticipated without interference, regardless of location. Trusted Delivery protects key service delivery infrastructure at remote and unattended cellular edge sites, as well within co-location and data center environments where shared facility access is a potential concern.

Extreme Networks Logo (PRNewsFoto/Extreme Networks) (PRNewsFoto/Extreme Networks) (PRNewsfoto/Extreme Networks, Inc.)

Extreme Networks Logo (PRNewsFoto/Extreme Networks) (PRNewsFoto/Extreme Networks) (PRNewsfoto/Extreme Networks, Inc.)

With cyberattacks on the rise, supply chain security is more critical than ever, requiring state-of-the-art network technology from end to end. Trusted Delivery enables network administrators to validate hardware components, boot processes, and the operating system (OS) throughout the device lifecycle – without disrupting device functionality – mitigating the risk of supply chain cyberattacks.

Key Benefits:

  • Secure Foundation for Future Deployments: With Trusted Delivery, Extreme delivers an additional layer of certainty for service providers that are beginning to move away from legacy solutions and ensures a foundation of secure, validated infrastructure to support new networks. Available today across the Extreme 8000 Series, including the Extreme 8520 and Extreme 8720 data center and cellular edge leaf and spine switches, Trusted Delivery provides mechanisms for verifying device security and performance during operation, enabling service providers to deploy new infrastructure with confidence.

  • Increased Simplicity in Hardware Validation: Measured boot, an anti-temper mechanism, gives operators the ability to validate hardware and boot processes remotely without shutting the device down. This saves time and resources and prevents unnecessary service disruptions. Measured boot implementation is enabled by a microcontroller-based hardware root of trust (HWRoT) in conjunction with a Trusted Platform Module (TPM)….

Source…

CACI partners with Yubico to enhance trusted mobile platforms


CACI announced that it has entered into a partnership with Yubico through a memorandum of understanding that establishes Yubico as the exclusive provider of multi-factor authentication (MFA) solutions in support of CACI’s trusted mobile platforms.

CACI Yubico

Yubico will provide YubiKey 5 FIPS Series products for enhanced security and authentication protocols for CACI’s software-defined key loading devices that enable more capable, secure, and resilient communications for U.S. government missions.

Yubico’s YubiKey 5 FIPS Series are multi-protocol security keys that eliminate account takeovers from phishing attacks with strong two-factor, multi-factor and passwordless authentication. These security keys support applications and services using a range of protocols such as OTP, FIDO U2F and FIDO2/WebAuthn and a Personal Identity Verification-compatible (PIV) Smart Card.

The YubiKey 5 FIPS series is NSA-approved for the Department of Defense (DoD) to provide the highest level of user authentication and supports the ability to remove the tool following authentication in accordance with National Institute of Standards and Technology (NIST) usability guidelines for multi-factor cryptographic devices.

“The U.S. military and government agencies have a critical need for more secure, modern communications technology to help counter current and future threats,” said Todd Probert, President of National Security and Innovative Solutions at CACI. “CACI and our partners are bringing this state-of-the-art multi-factor authentication tool, combined with the most-advanced mobile hand-held device for trusted mobile platforms to the market. This capability is streamlined, proven and tested, and ready to deliver today in support of national security missions.”

“With data breaches continuing to rise, it has become increasingly critical for companies and government agencies to embrace a move toward modern, phishing-resistant, multi-factor authentication,” said Stina Ehrensvärd, CEO and co-founder, Yubico. “In the past several months, we’ve seen the US government release its Draft Zero Trust Strategy, as well as a number of other actions, including a cybersecurity executive order,…

Source…

Coast Guard updating cyber planning and committing to industry best practices for maritime trusted computing – Military & Aerospace Electronics



Coast Guard updating cyber planning and committing to industry best practices for maritime trusted computing  Military & Aerospace Electronics

Source…