Welcome!

SDN Journal Authors: Elizabeth White, Liz McMillan, Pat Romanski, Stefan Bernbo, TJ Randall

News Feed Item

The First Academy Selects Extreme Networks to Tackle Rapid Growth in Mobile

Extreme's End-to-End Networking Technology Provides Controlled Wireless Access for BYOD Environment and Aids Apple Distinguished School Initiatives

SAN JOSE, Calif., March 13, 2014 /PRNewswire/ -- The First Academy (TFA), a Christian college-preparatory school in Central Florida, selected end-to-end networking solutions from Extreme Networks (Nasdaq: EXTR), a leading provider of high performance network solutions, to help with its goal of earning an Apple Distinguished School (ADS) title and to handle a rapidly expanding mobile environment fueled by the school's one-to-one iPad program and BYOD initiative.

Extreme Networks logo.

With over 1,200 students from K4 through 12th grade, cost, reliability, consistency, interoperability and ease-of management were all concerns and at the top-of-the-mind of the IT personnel at TFA. As TFA prepared to double wireless usage among its users, their biggest concern was the ability to securely onboard, prioritize, limit and even restrict network access for devices that were not in compliance with their school policies, especially given the variety of wireless devices in its classrooms and that are now part of its BYOD initiative.

Key Facts

  • The Extreme OneFabric Connect is able to connect TFA's mobile management solution, Casper, to the Extreme Mobile IAM solution, allowing TFA to set policies and check devices against its database each time a device seeks access to the network. If the criteria set by TFA are not fulfilled, the device is redirected and cannot gain access to the Wi-Fi network until they have been met. Extreme's networking solution keeps the mobile device connected to the Wi-Fi network.
  • Extreme's IdentiFi Wireless solution has enabled TFA to provide reliable, secure wireless coverage for 1,200 students across a 100,000 square foot campus. With Extreme's products, TFA is now able to support BYOD and one-on-one initiatives while increasing the control and productivity of their one network manager with a complete solution.
  • The OneFabric architecture has brought the entire network into one unified view, reducing network complexity and allowing TFA to simplify its network by making all their networking and computer equipment work together. With less time spent managing the network and problem solving, TFA's IT personnel have seen significant productivity increases.

Executive Perspectives

Corey Radford, Systems Administrator, The First Academy

"Prior to the Extreme implementation, we had no way to assess device status and enforce compliance with our policies. Now if a valid profile is not installed, the device cannot use the network and I can finally sleep at night without having to worry about rogue devices threatening the security of our network. I have been working in IT for a long time and have never seen this level of control.  Extreme's networking solution is literally so simple that I can just click and deny a device from granting access until it is in full compliance."

Bob Nilsson, Director of Vertical Solutions, Extreme Networks

"One of the main reasons TFA chose Extreme was because our products were able to interoperate with the school's other vendor products seamlessly. In just four months, the school went from servicing a couple hundred wireless devices to more than doubling TFA's service to 800 to 1,000 devices without increasing IT incidents but rather decreasing them. Extreme has provided TFA peace of mind.  TFA now feels comfortable that its network is secure when students' access the Internet and that its network is protected from potential damaging devices."

Additional Resources

About The First Academy
The First Academy is a Christ-centered college-preparatory school serving over 1,100 Central Florida students attending K4 through 12th grade. Since its opening in 1987, TFA has continued to grow the academic, fine arts, and athletic programs that have elevated its students to the highest levels of achievement and helped develop strength of character that leads young men and women to serve others in their own community and across the globe.

About Extreme Networks
Extreme Networks, Inc. (NASDAQ: EXTR) is setting a new standard for superior customer experience by delivering network-powered innovation and market leading service and support. The company delivers high-performance switching and routing products for data center and core-to-edge networks, wired/wireless LAN access, and unified network management and control.  Our award-winning solutions include software-defined networking (SDN), cloud and high-density Wi-Fi, BYOD and enterprise mobility, identity access management and security.  Extreme Networks is headquartered in San Jose, CA and has more than 12,000 customers in over 80 countries.  For more information, visit the company's website at http://www.extremenetworks.com.

Extreme Networks, the Extreme Networks logo, and Purview are either trademarks or registered trademarks of Extreme Networks, Inc. in the United States and/or other countries. All other names are the property of their respective owners.

Except for the historical information contained herein, the matters set forth in this press release, including without limitation statements as to features, performance, and benefits of Extreme Networks products, are forward-looking statements within the meaning of the "safe harbor" provisions of the Private Securities Litigation Reform Act of 1995. These forward-looking statements speak only as of the date. Because such statements deal with future events, they are subject to risks and uncertainties, including network design and actual results of use of the product in different environments. We undertake no obligation to update the forward-looking information in this release. Other important factors which could cause actual results to differ materially are contained in the Company's 10-Qs and 10-Ks which are on file with the Securities and Exchange Commission. http://www.sec.gov.

Media Contacts:

Gregory Cross
Extreme Networks Public Relations
1 408 579 3483
[email protected] 

Jennifer Grabowski
Racepoint Global
1 617 624 3231
[email protected]

Logo - http://photos.prnewswire.com/prnh/20140204/NE58480LOGO

SOURCE Extreme Networks, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...