Extreme Networks Moves Into Edge Device Security With Defender fo

#artificialintelligence

Extreme Networks is moving into IoT security with its new product, Defender for IoT, that secures wired and wireless devices. Gartner estimates that 20.4 billion connected things will be in use by organizations worldwide by 2020. And IoT device attacks are on the rise. The product targets smart cities, industrial IoT, and connected health care. It secures devices that don't have embedded security, said Abby Strong, vice president of product marketing at Extreme Networks.


Edgewise Networks' Simple Microsegmentation Strategy Takes On VMw

#artificialintelligence

Edgewise Networks, a security startup that's taking on industry giants VMware and Cisco with its microsegmentation technology, has a simple plan to win market share. "As far as the microsegmentation space is concerned, it has been viewed as very complex," said CEO Peter Smith. "Really, the drive behind our pursuit of these patents is bringing extreme simplicity, extreme automation to the problem of microsegmentation and zero trust." Microsegmentation enables fine-grained security policies to be assigned to cloud and data center applications. The approach improves network security by integrating it directly into a virtualized workload without requiring a hardware-based firewall.


Edgewise Networks' Simple Microsegmentation Strategy Takes On VMw

#artificialintelligence

Edgewise Networks, a security startup that's taking on industry giants VMware and Cisco with its microsegmentation technology, has a simple plan to win market share. "As far as the microsegmentation space is concerned, it has been viewed as very complex," said CEO Peter Smith. "Really, the drive behind our pursuit of these patents is bringing extreme simplicity, extreme automation to the problem of microsegmentation and zero trust." Microsegmentation enables fine-grained security policies to be assigned to cloud and data center applications. The approach improves network security by integrating it directly into a virtualized workload without requiring a hardware-based firewall.


Big data revives IT operations analytics

#artificialintelligence

At least in IT, the cobbler's children haven't always been last on the list. For decades, IT operations have been helped by sophisticated tools. Still, many management challenges remained seemingly intractable. At last, though, that final frontier has been breached by a new generation of IT operations analytics tools that use far more sophisticated mechanisms to illuminate problems and posit solutions. "Many vendors are extending their tools in the area of big data and analytics to solve operational, availability and user experience issues," said Tim Grieser, program vice president for enterprise system management software at IDC. "What's new here is incorporating that big data and analytics perspective to take into account very large volumes of data from a lot of sources."


Artificial Intelligence: Cybersecurity Friend or Foe?

#artificialintelligence

Just as organizations can use artificial intelligence to enhance their security posture, cybercriminals may begin to use it to build smarter malware. This is precisely why a security fabric approach is needed -- security solutions for network, endpoint, application, data center, cloud and access working together as an integrated and collaborative whole -- combined with actionable intelligence to hold a strong position on autonomous security and automated defense. In the future, we will have attacker/defender AI scenarios play out. At first, they will employ simple mechanics. Later, they will play out as intricate scenarios with millions of data points to analyze and address.