Click here to close now.

Welcome!

SDN Journal Authors: Carmen Gonzalez, Michael Jannery, Lori MacVittie, Dana Gardner, Liz McMillan

News Feed Item

The First Academy Selects Extreme Networks to Tackle Rapid Growth in Mobile

Extreme's End-to-End Networking Technology Provides Controlled Wireless Access for BYOD Environment and Aids Apple Distinguished School Initiatives

SAN JOSE, Calif., March 13, 2014 /PRNewswire/ -- The First Academy (TFA), a Christian college-preparatory school in Central Florida, selected end-to-end networking solutions from Extreme Networks (Nasdaq: EXTR), a leading provider of high performance network solutions, to help with its goal of earning an Apple Distinguished School (ADS) title and to handle a rapidly expanding mobile environment fueled by the school's one-to-one iPad program and BYOD initiative.

Extreme Networks logo.

With over 1,200 students from K4 through 12th grade, cost, reliability, consistency, interoperability and ease-of management were all concerns and at the top-of-the-mind of the IT personnel at TFA. As TFA prepared to double wireless usage among its users, their biggest concern was the ability to securely onboard, prioritize, limit and even restrict network access for devices that were not in compliance with their school policies, especially given the variety of wireless devices in its classrooms and that are now part of its BYOD initiative.

Key Facts

  • The Extreme OneFabric Connect is able to connect TFA's mobile management solution, Casper, to the Extreme Mobile IAM solution, allowing TFA to set policies and check devices against its database each time a device seeks access to the network. If the criteria set by TFA are not fulfilled, the device is redirected and cannot gain access to the Wi-Fi network until they have been met. Extreme's networking solution keeps the mobile device connected to the Wi-Fi network.
  • Extreme's IdentiFi Wireless solution has enabled TFA to provide reliable, secure wireless coverage for 1,200 students across a 100,000 square foot campus. With Extreme's products, TFA is now able to support BYOD and one-on-one initiatives while increasing the control and productivity of their one network manager with a complete solution.
  • The OneFabric architecture has brought the entire network into one unified view, reducing network complexity and allowing TFA to simplify its network by making all their networking and computer equipment work together. With less time spent managing the network and problem solving, TFA's IT personnel have seen significant productivity increases.

Executive Perspectives

Corey Radford, Systems Administrator, The First Academy

"Prior to the Extreme implementation, we had no way to assess device status and enforce compliance with our policies. Now if a valid profile is not installed, the device cannot use the network and I can finally sleep at night without having to worry about rogue devices threatening the security of our network. I have been working in IT for a long time and have never seen this level of control.  Extreme's networking solution is literally so simple that I can just click and deny a device from granting access until it is in full compliance."

Bob Nilsson, Director of Vertical Solutions, Extreme Networks

"One of the main reasons TFA chose Extreme was because our products were able to interoperate with the school's other vendor products seamlessly. In just four months, the school went from servicing a couple hundred wireless devices to more than doubling TFA's service to 800 to 1,000 devices without increasing IT incidents but rather decreasing them. Extreme has provided TFA peace of mind.  TFA now feels comfortable that its network is secure when students' access the Internet and that its network is protected from potential damaging devices."

Additional Resources

About The First Academy
The First Academy is a Christ-centered college-preparatory school serving over 1,100 Central Florida students attending K4 through 12th grade. Since its opening in 1987, TFA has continued to grow the academic, fine arts, and athletic programs that have elevated its students to the highest levels of achievement and helped develop strength of character that leads young men and women to serve others in their own community and across the globe.

About Extreme Networks
Extreme Networks, Inc. (NASDAQ: EXTR) is setting a new standard for superior customer experience by delivering network-powered innovation and market leading service and support. The company delivers high-performance switching and routing products for data center and core-to-edge networks, wired/wireless LAN access, and unified network management and control.  Our award-winning solutions include software-defined networking (SDN), cloud and high-density Wi-Fi, BYOD and enterprise mobility, identity access management and security.  Extreme Networks is headquartered in San Jose, CA and has more than 12,000 customers in over 80 countries.  For more information, visit the company's website at http://www.extremenetworks.com.

Extreme Networks, the Extreme Networks logo, and Purview are either trademarks or registered trademarks of Extreme Networks, Inc. in the United States and/or other countries. All other names are the property of their respective owners.

Except for the historical information contained herein, the matters set forth in this press release, including without limitation statements as to features, performance, and benefits of Extreme Networks products, are forward-looking statements within the meaning of the "safe harbor" provisions of the Private Securities Litigation Reform Act of 1995. These forward-looking statements speak only as of the date. Because such statements deal with future events, they are subject to risks and uncertainties, including network design and actual results of use of the product in different environments. We undertake no obligation to update the forward-looking information in this release. Other important factors which could cause actual results to differ materially are contained in the Company's 10-Qs and 10-Ks which are on file with the Securities and Exchange Commission. http://www.sec.gov.

Media Contacts:

Gregory Cross
Extreme Networks Public Relations
1 408 579 3483
[email protected] 

Jennifer Grabowski
Racepoint Global
1 617 624 3231
[email protected]

Logo - http://photos.prnewswire.com/prnh/20140204/NE58480LOGO

SOURCE Extreme Networks, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
The excitement around the possibilities enabled by Big Data is being tempered by the daunting task of feeding the analytics engines with high quality data on a continuous basis. As the once distinct fields of data integration and data management increasingly converge, cloud-based data solutions providers have emerged that can buffer your organization from the complexities of this continuous data cleansing and management so that you’re free to focus on the end goal: actionable insight.
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics arc...
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
The Internet of Things (IoT) is causing data centers to become radically decentralized and atomized within a new paradigm known as “fog computing.” To support IoT applications, such as connected cars and smart grids, data centers' core functions will be decentralized out to the network's edges and endpoints (aka “fogs”). As this trend takes hold, Big Data analytics platforms will focus on high-volume log analysis (aka “logs”) and rely heavily on cognitive-computing algorithms (aka “cogs”) to mak...
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
VictorOps is making on-call suck less with the only collaborative alert management platform on the market. With easy on-call scheduling management, a real-time incident timeline that gives you contextual relevance around your alerts and powerful reporting features that make post-mortems more effective, VictorOps helps your IT/DevOps team solve problems faster.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices ra...
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been ...
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focu...
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes ...
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, it is now feasible to create a rich desktop and tuned mobile experience with a single codebase, without compromising performance or usability.
SYS-CON Events announced today Arista Networks will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Arista Networks was founded to deliver software-driven cloud networking solutions for large data center and computing environments. Arista’s award-winning 10/40/100GbE switches redefine scalability, robustness, and price-performance, with over 3,000 customers and more than three million cloud networking ports depl...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, will explain the best practices of continuous testing at high scale, which is r...
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
SYS-CON Events announced today that Open Data Centers (ODC), a carrier-neutral colocation provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Open Data Centers is a carrier-neutral data center operator in New Jersey and New York City offering alternative connectivity options for carriers, service providers and enterprise customers.
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...