Extreme’s Cloud

Simplify Management Though a Consistent Operational Model

The Industry’s Only Cloud Continuum for Choice and Security

Increased Choice and Control 

  • Public, Private, and ExtremeCloud Edge deployment options to balance cloud sovereignty, privacy, performance, and cost.

  • Choice of twenty-one global PoPs: AWS, Microsoft Azure, and GCP or on-site deployment for data residency choice

Ensure Compliance

  • Secure by design with audited data deletion tools, Extreme’s industry leading platform conforms to security standards and data privacy compliance requirements.

  • Widely certified, including ISO / IEC 27017 / IEC 27001 and ISO / IEC 27701.

  • CCPA/CPRA and GDPR privacy compliance

Reduce Complexity

  • One cloud to host the Extreme application portfolio.

  • Uniform operational model across deployment options.

  • Universal licensing supports migration to the cloud.

Deployment Type

Public Cloud

Private Cloud

ExtremeCloud Edge

Description

SaaS-based delivery of services in a public
Regional Data Center (RDC)

Dedicated customer instance in public cloud

Extreme or customer orchestration of applications in on-premises
Universal Compute Platform (UCP)

Product Hosted  ExtremeCloud IQ, ExtremeCloud SD-WAN  ExtremeCloud IQ  ExtremeCloud IQ,
ExtremeCloud SD-WAN
 Deployment Options  AWS, Azure, or GCP  AWS, Azure, or GCP  UCP configurations on MSP or
on enterprise premises
 Value / Differentiator  Simple SaaS delivery model  Data privacy and isolation  Data Sovereignty and low latency performance

Cloud-Platform-Diagram.png

Worldwide Cloud PoPs for Regional Availability

Amazon Web Services, Microsoft Azure, and Google Cloud Platform hosting in North America, Europe, and Asia Pacific enable regional performance optimization and compliance with local data security and privacy regulations.

View Global Data Centers Locations View Global Data Centers Locations
Security Practices Technologies and Compliance Cloud Platform Web Image

Industry-Leading Security Practices

Extreme Networks’ Cloud Services are hosted within Amazon Web Services (AWS), Microsoft Azure, and Google Cloud data centers, taking advantage of their security and compliance capabilities at the data-center layer. Extreme Networks takes additional measures to secure our cloud-based applications.

Threats to the availability, integrity, and confidentiality of customers’ information are taken seriously. Extreme is the first major cloud networking vendor recognized by the global standard for commitment to information security management systems best practices and controls.

Extreme has implemented continuous monitoring for malicious and unauthorized behavior, including unauthorized system access and brute-force attacks. Firewalls control and protect inbound and outbound traffic, and industry-leading tools address DDoS-attack prevention and flow control.

Extreme secures access to the underlying computing infrastructure with features like VPC, NAT, TLS encryption, reporting tools, and automated password protection. Along with limiting access to a small number of designated engineers. Extreme also monitors and tracks DevOps personnel activities in its cloud environments, with a server and application audit trail.

Extreme provides daily backups of production network data and storage of backups in an encrypted state. For added security, our cloud networking solution also encrypts data while in transit between a customer’s site and the regional data center (RDC) containing the customer’s ExtremeCloud IQ instance. The RDCs do not collect or retain any data traffic generated on the customer networks.

Extreme employs industry-standard OS hardening processes for production server deployment. All ExtremeCloud IQ releases and patches are hardened with continuous penetration scanning for application vulnerabilities, to prevent any issues prior to actual deployment in production.