Avaya Surge™ Solution

Making IoT Easy

The IoT Solution that Secures, Automates, and Learns

  • Create HyperSec zones for thousands of IoT devices on any network. The technology set that creates encrypted zones, HyperSec helps the Avaya Surge™ solution isolate, filter, and encrypt data flows from device to destination. Security profiles determine who or what a device communicates with. Avaya Surge seamlessly integrates into any vendor’s network so you can reduce your attack surface and keep exposure to a minimum.
  • Use elasticity to automate profile assignments and device onboarding. Security profiles are automatically created and move with each device, offloading complex firewall and access control list administration. Native automation and built-in utilities accelerate on-boarding, facilitating more agile service delivery.
  • Leverage IoT intelligence to analyze security posture and device usage. Monitor your devices’ dynamic activity—including service status, utilization, and location history coupled with device performance and anomaly reporting.
  • Learn more about Avaya Surge. Our Solution Brief goes deeper into how we secure, automate, and manage IoT devices. And this Nemertes Research Report looks at the benefits achieved by real-world companies using Avaya Surge—including completely eliminating their costs for securing and moving IoT devices.
  • Read an analyst’s comments in this NetworkWorld article “Avaya Surge protects the Internet of Things.”

Mitigate Breaches

Reduce the attack surface as you place your IoT traffic into isolated zones. Any breaches into security zones are contained and impede lateral movement. Viral infections are filtered out to and from the device. 

Accelerate Network Innovation

Deploy thousands of innovative devices faster and more securely than ever. You’ll reduce errors, improve IT productivity, and free up your staff to focus on strategic initiatives. The Avaya Surge Solution lets you capably scale the ever-growing number of technologies available.

Leverage Actionable Insights

Stay one step ahead of the hackers by continually using data to improve your security posture. Monitor asset usage, location, and performance, so you can make decisions that optimize capital investments. With an SDN-based platform, you can tailor applications to fit your purposes. 

Customer Story Video
Kroenke Sports & Entertainment

“What we do changes regularly and we need to be able to extend our network, expand our network to the operations we have."

Play video ›
How the Avaya Surge Solution Works

How the Avaya Surge Solution Works

Your Avaya Surge solution uses Avaya Open Networking Adapters and an IoT Controller. The Adapter connects to any device with an Ethernet port and becomes its proxy intelligence. Once paired, the Adapter and the IoT Controller work together to automate the device’s identity, security profile, and management. Additionally, the IoT controller monitors device movement, manages profiles, reports, and collects data flows. APIs enable adjunct storage, analysis, and integration into networking or communications systems.

Infographic
Prepared for the Everywhere Perimeter? Here’s what IT Pros Say about Segmentation

Prepared for the Everywhere Perimeter? Here’s what IT Pros Say about Segmentation

Get the stats >
White Paper
Cybersecurity through Hyper-Segmentation: a Practical Foundation for Network-wide Security

Cybersecurity through Hyper-Segmentation: a Practical Foundation for Network-wide Security

Download now >
Webinar
See Avaya’s approach to securing your network’s everywhere perimeter.

See Avaya’s approach to securing your network’s everywhere perimeter.

Watch now >

Connect With Avaya