Cloud Platform 

Simplify Management Though a Consistent Operational Model

The Industry’s Only Cloud Continuum for Choice and Security

Increased Choice and Control 

  • Public, Private, and ExtremeCloud Edge deployment options to balance cloud sovereignty, privacy, performance, and cost.

  • Choice of twenty-one global PoPs: AWS, Microsoft Azure, and GCP or on-site deployment for data residency choice

Ensure Compliance

  • Secure by design with audited data deletion tools, Extreme’s industry leading platform conforms to security standards and data privacy compliance requirements.

  • Widely certified, including ISO / IEC 27017 / IEC 27001 and ISO / IEC 27701.

  • CCPA/CPRA and GDPR privacy compliance

Reduce Complexity

  • One platform to host the ExtremeCloud application portfolio.

  • Uniform operational model across deployment options.

  • Universal licensing supports migration to the cloud.

Deployment Choice with ExtremeCloud Edge

Extreme offers a range of deployment options that provide flexibility, continuous innovation, and a consistent user experience. ExtremeCloud Edge solutions enable enhanced customer cloud sovereignty, low-latency performance, and hybrid application implementations.

Learn More

Deployment Type

Public Cloud

Private Cloud

ExtremeCloud Edge

Description

SaaS-based delivery of services in a public
Regional Data Center (RDC)

Dedicated customer instance in public cloud

Extreme or customer orchestration of applications in on-premises
Universal Compute Platform (UCP)

Product Hosted  ExtremeCloud IQ, ExtremeCloud SD-WAN  ExtremeCloud IQ  ExtremeCloud IQ,
ExtremeCloud SD-WAN
 Deployment Options  AWS, Azure, or GCP  AWS, Azure, or GCP  UCP configurations on MSP or
on enterprise premises
 Value / Differentiator  Simple SaaS delivery model  Data privacy and isolation  Data Sovereignty and low latency performance

Cloud-Platform-Diagram.png

Worldwide Cloud PoPs for Regional Availability

Amazon Web Services, Microsoft Azure, and Google Cloud Platform hosting in North America, Europe, and Asia Pacific enable regional performance optimization and compliance with local data security and privacy regulations.

View Global Data Centers Locations View Global Data Centers Locations
Security Practices Technologies and Compliance Cloud Platform Web Image

Industry-Leading Security Practices

Extreme Networks’ Cloud Services are hosted within Amazon Web Services (AWS), Microsoft Azure, and Google Cloud data centers, taking advantage of their security and compliance capabilities at the data-center layer. Extreme Networks takes additional measures to secure our cloud-based applications.

Threats to the availability, integrity, and confidentiality of customers’ information are taken seriously. Extreme is the first major cloud networking vendor recognized by the global standard for commitment to information security management systems best practices and controls.

Extreme has implemented continuous monitoring for malicious and unauthorized behavior, including unauthorized system access and brute-force attacks. Firewalls control and protect inbound and outbound traffic, and industry-leading tools address DDoS-attack prevention and flow control.

Extreme secures access to the underlying computing infrastructure with features like VPC, NAT, TLS encryption, reporting tools, and automated password protection. Along with limiting access to a small number of designated engineers. Extreme also monitors and tracks DevOps personnel activities in its cloud environments, with a server and application audit trail.

Extreme provides daily backups of production network data and storage of backups in an encrypted state. For added security, our cloud networking solution also encrypts data while in transit between a customer’s site and the regional data center (RDC) containing the customer’s ExtremeCloud IQ instance. The RDCs do not collect or retain any data traffic generated on the customer networks.

Extreme employs industry-standard OS hardening processes for production server deployment. All ExtremeCloud IQ releases and patches are hardened with continuous penetration scanning for application vulnerabilities, to prevent any issues prior to actual deployment in production.