CIOs Focused on Analytics, AI and Cybersecurity: Bob Gault, Extreme Networks

PRADEEP CHAKRABORTY | January 21, 2019

article image
Extreme Networks delivers customer-driven enterprise networking solutions that create stronger connections with customers, partners, and employees. It is focused on customer-driven networking to improve transformation, innovation, and customer experience – from the enterprise edge to the cloud – with software driven-solutions that are agile, adaptive, and secure. Bob Gault, Chief Revenue & Services Officer, Extreme Networks, tells us more. Excerpts: Bob Gault: Most vendors today sell closed technology stacks with domain-level visibility. This makes it difficult for customers to adopt new, software-driven approaches that drive the business forward, or to test new technologies that aren’t driven by the vendor they have aligned with. In contrast,  Extreme provides technology that works in a multi-vendor heterogeneous environment, eliminating vendor lock-in. We deliver real, multi-vendor capabilities that meet the needs of the modern enterprise. For example, the Extreme Management Center allows for full visibility and management of multi-vendor networks, and Extreme Workflow Composer enables cross-domain, multi-vendor IT automation that allows organizations to automate at their pace—from automating simple tasks to deploying sophisticated workflows.

Spotlight

IoT Experts

IoT Experts gathers international experts in the domain of the Internet of Things (IoT). It liaises with the European and international research community on IoT, encompassing application domains such as smart cities, smart buildings, smart factories, mobility, smart agriculture, environment monitoring, etc.

OTHER ARTICLES

How to Rapidly Scale IT Infrastructure For Remote Workers

Article | April 13, 2020

Rapid IT infrastructure scaling is always challenging. In March 2020, the coronavirus caused a surge in remote workers as organizations switched overwhelmingly to work-from-home policies. Scaling IT infrastructure to support this sudden shift proved to be a struggle for IT teams, resulting in a migration to cloud-based applications and solutions, a rush on hardware that can support a remote environment, and challenges scaling VPNs to support remote worker security. Here are some of the insights and lessons learned from IT professionals.

Read More

Was Your IT Infrastructure Ready for COVID-19?

Article | April 7, 2020

Lockdowns, quarantines, travel bans, restrictions on social life and more. The world is facing one of its biggest challenges right now, something that was predicted multiple times in the past, but something no one paid much attention to until now. The impact on our future life is still up in the air, but what about IT? I have been asking clients and colleagues “What is the real impact of COVID-19 on your IT infrastructure?” for a couple of weeks now, while also trying to get a grasp on what is really happening to both IT professionals and the IT vendor community. While my focus is on data storage, I’m pretty sure that a similar analysis of other areas of IT will lead to the same conclusions. Here is a very basic example.

Read More

SASE as a Business Continuity Solution

Article | April 9, 2020

As offices worldwide sit abandoned, many of the millions of employees ordered to stay home are actually keeping hard at work, taking advantage of residential broadband connections, VPNs, email, video conferencing, and instant messaging applications to do their jobs. Thank the corporate world’s willingness to let employees occasionally work from home for the necessary IT infrastructure. However, as much as we’d like this alone to solve the business continuity challenges, enabling a handful of employees to work from home once a week is trivial compared to ensuring all of a company’s employees can do so for months on end.

Read More

Cyber security best practice in mission critical SCADA systems

Article | April 6, 2020

Due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensueWith cyber-attacks fast becoming the weapon of choice to compromise critical infrastructures, the need for a proactive approach to cyber security in SCADA systems has become imperative. Security is a much larger issue than often realized, as many cyber-attacks on SCADA system still going un-reported. There are several reasons why many cyber-attacks are swept under the carpet, including to protect brand reputation or to avoid highlighting vulnerabilities that could attract further attacks. However, due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensue.

Read More

Spotlight

IoT Experts

IoT Experts gathers international experts in the domain of the Internet of Things (IoT). It liaises with the European and international research community on IoT, encompassing application domains such as smart cities, smart buildings, smart factories, mobility, smart agriculture, environment monitoring, etc.

Events