Avaya Approach to Network Segmentation Helps Secure the Everywhere Perimeter

20 Sep 2016

Hyper- Segmentation, Native Stealth and Automated Elasticity create additional layers to network security; Avaya makes it practical

Guildford, UK 2016 - Avaya is announcing a new foundation approach to network security that aims to reduce the growing number of breaches compromising data integrity and privacy. The new approach will enable organisations to create stealth, hyper-segments within their networks that are invisible to hackers and provide the elasticity to protect the ‘everywhere perimeter’.

While trends such as mobility, IoT and cloud computing promise enormous opportunity and benefit, they also make it nearly impossible to determine the location of organisation’s network boundaries and thus, real and potential security threats stymie progress. The reality today is that an organisation’s network perimeter is now everywhere, making it even more critical that security is a core component of the network architecture that is capable of extending to any potential access point - whether that’s in the cloud, a mobile device or a sensor unit in a HVAC system.

Hyper-segmentation — the ability to create secure “swim lanes” within the overall network based on a particular function, location or service — offers a means of addressing security breaches by limiting how far a hacker can go once they gain access. But, while IT professionals agree that end-to-end segmentation is essential for security (see related research), few currently deploy such a strategy for various reasons, including it’s too complex, too resource intensive or don’t believe it’s possible.

Avaya Networking offers a different approach to securing the “everywhere perimeter” that comprises three synergistic capabilities: 

  • Hyper-Segmentation: The ability to create stealth segments that span the entire network.
  • Native Stealth: The characteristic of a hyper-segment that is invisible to hackers.
  • Automated Elasticity: The capability to create and remove hyper-segments automatically

Avaya’s capabilities start at the foundational layer --a shared control plane — to automatically manage hyper-segments seamlessly and invisibly across the organization. Avaya SDN and identity technologies eliminate the tradeoff between security and complexity by automating the onboarding and access of devices, users, switches, and servers to make protecting and managing every-where access effortless.

Avaya’s capabilities are comprised of the following Avaya products:

  • Fabric Connect, Fabric Attach, and Fabric Extend (software feature on Avaya Switches)
  • Identity Engines (network access software)
  • Open Networking Adapter (open server software on a pocket-sized appliance)
  • SDN Controller (software delivered today on a server tomorrow bundled with Avaya Fabric Orchestrator delivered on a server)
  • WLAN 9100 (wireless controller software delivered on Avaya access points)
  • Deployment and management services

“End-to-end network segmentation has been possible for some time; however, the likely reason that most organizations have not implemented is that its arduous nature made it impractical. Avaya is putting forward a technology that should allow organizations to actually be able to implement and maintain the technology and work within their current staffing envelope.”   
Mike Fratto, Research Director, Business Technology and Software, Current Analysis

“As the number of network security breaches reach staggering proportions1 - an increase of 38% in just the past year alone - hackers seem to be just one step ahead of the latest security technologies. Avaya’s approach to network security begins at the core and extends wherever the business needs it to be. Our hyper-segmentation, native stealth and automated elasticity capabilities creates safety zones that hackers can’t see, and therefore won’t be able to access.”
Marc Randall, senior vice president and GM, Avaya Networking

1The 2015 Cost of Cyber Crime report indicates that cybercrime is costing US companies an annual average of $15.4 million/yr, and were seeing an average of 160 successful cyber attacks per week. 2015 Cost of Cyber Crime Study: United States, Ponemon Institute, October, 2015, http://img.delivery.net/cm50content/hp/hosted-files/2015_US_CCC_FINAL_4.pdf

Resources: Securing the Everywhere Perimeter
Read the Blog
Watch the Video
View the Infographic
Read the Whitepaper

Additional Resources
Executive Summary: End-To-End Network Segmentation Research
Whitepaper: The New World of Network Security

About Avaya
Avaya is a leading provider of solutions that enable customer and team engagement across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance. Its world-class contact center and unified communications technologies and services are available in a wide variety of flexible on-premises and cloud deployment options that seamlessly integrate with non-Avaya applications. Avaya Breeze enables third parties to create and customize business applications for competitive advantage.  The Avaya fabric-based networking solutions help simplify and accelerate the deployment of business critical applications and services.  For more information please visit www.avaya.com

Certain statements contained in this press release may be forward-looking statements. These statements may be identified by the use of forward-looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," "plan," "potential," "predict," "should" or "will" or other similar terminology.  We have based these forward-looking statements on our current expectations, assumptions, estimates and projections. While we believe these are reasonable, such forward looking statements involve known and unknown risks and uncertainties, many of which are beyond our control. These and other important factors may cause our actual results to differ materially from any future results expressed or implied by these forward-looking statements. For a list and description of such risks and uncertainties, please refer to Avaya's filings with the SEC that are available at www.sec.gov. Avaya disclaims any intention or obligation to update or revise any forward-looking statements.

All trademarks identified by ®, TM, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners

Rachel Preston


+44 1483 308107