We changed our name from IT Central Station: Here's why

ExtremeSecurity OverviewUNIXBusinessApplication

What is ExtremeSecurity?
Buyer's Guide

Download the Intrusion Detection and Prevention Software (IDPS) Buyer's Guide including reviews and more. Updated: January 2022

ExtremeSecurity Customers
Henry Ford Health System, Baltimore Ravens, Brandili, Federal University of Alagoas, CEDAE, Caxias do Sul, UNISC Concurrency, CenturyLink Field, Louisiana College, Cricket Tasmania Stadium, Moscow Internet Exchange
ExtremeSecurity Video

ExtremeSecurity Reviews

Filter by:
Filter Reviews
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
Founder and CEO at a security firm with 11-50 employees
Real User
Top 5
Great policy enforcement, simple to use, can traverse multiple switches; lacks cyber asset tracking
Pros and Cons
  • "Ability to assign zero trust policies from the user."
  • "Lacks cyber asset tracking."

What is our primary use case?

I'm the founder of the company. 

What is most valuable?

The most valuable feature is that you can assign zero trust policies from the user. As a result, policy enforcement is very good, it's simple to use and it can traverse multiple switches. The policy works for everyone, whether it's a customer, enterprise organization or someone working from home. It has all layers of security capabilities and that's very useful. Once users are connected you can subscribe a policy that can switch firewalls from remote or from the core network which is useful now that more people are working from home. They can enforce the deep packet inspection, the application layer, presentation layer, and things like that. There is a full suite of capabilities all under the same operating system. If you change one area, the global policy setting can be pushed out for all assets. 

What needs improvement?

From my perspective, they need to add cyber asset tracking. You can't defend what you don't know, and they're missing the wireless cyber assets. The problem that you have with wireless is that it's more of a rollout product. It's a fixed chip set of 2.4 or 2.5 gigahertz only. When you look at 5GS, it's taking advantage of six gigahertz and of 600 megahertz. Extreme doesn't have a product to fill that gap, so they're flying blind to the new multi-access edge. Whether it's a security feature, an update, or it's adding zero trust policies to their running and switch platform, they're missing that; it's an area that needs beefing up.

Which other solutions did I evaluate?

Extreme has a different operating system that is easier to use and easier to apply a policy from the edge to the core than Cisco or other solutions offer. Extreme is also backward compatible. You may have firewalls and switches on different versions, but it's compatible. With Cisco, you need to have them all on the same version in order for it to flow through from the edge to the core. You may have different organizations and slightly different versions, but you can easily appreciate an update that will be applicable across the deployment. Those are two key differences. 

Which deployment model are you using for this solution?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate