Kevin from Extreme Networks provided a background on their company and their focus on security and network solutions for K-12 and higher education institutions. The team also discussed various technologies, including network security and management, and the potential security risks of Minecraft and AI systems. Lastly, Sarah shared her recent personal and professional experiences, and Scott updated the team on upcoming events.
So, all right, I'm going to get started right here. Welcome everybody the March 20th edition of Technology Check-In. I hope everyone survived storm here yesterday and uh Everything seems be fairly okay You know, glad didn't have go out in snow know we several schools that are called off school again today but So that's what with it. originally, Jason. Northland systems, he was one who set this up had something come up. is not able make it It probably really doesn't matter a whole lot He actually organized extreme networks that, turn over Kevin. How you doing today, Kevin? great. Thanks for time. We'll give little background on networks. Let me share that. Okay, hold on. Oops, so should see screen now. Yes. Yep. Okay. All right. Well, thanks, everyone, appreciate time today. part wanted cover obviously bit, don't how many familiar Extreme Networks is. And then we'll kind into presentation Dom been when we're talking K-12s higher eds just talks about security from cybersecurity those things But there's also, everything still flows through network, whether it's wired or wireless Different can do different perspective. talk some products help accomplish goals around security, segmentation, like think 20, 25 minutes few questions. pick at end. ahead started. Networks. since mid-90s which being born 60s sound long ago, guess Depending numbers look at. either two three marketplace as far overall size. Big our business ed We venues business. if you've an MLB game, NFL NASCAR race. Typically used because major provide solutions industry, both on-prem managed well cloud. We're shipping 6E announced will start very soon Wi-Fi 7. course, there course 8's coming corner, there'll new introductions access points well. Full switching platforms way edge core bit fabric technology Xtreme has years. Especially depending type network use may good fit space. One thing did want touch switches points. They're call universal, basically means They run on-prem. Same OS. hardware. Our traditional building VLANs routings. also technology. made them universal. That customer choice networking Or choose boot switches. Other nice thing, same license across board. buy licensing time, you're having license. Oh, this. Because lysine gotten pretty complex industry. working simplify management, what's industry managing devices There's features capabilities compute memory. full player cloud management perspective, there. From wired, SD-WAN solutions. Just mean customers management. site engine, only devices, manage third party infrastructures. Hp Aruba, Cisco, types switches, monitoring evolving movements AI. Extremes midst revamp If Ai bolt-on i've solution oh now great aip sets bolt To additional functionality. simple making starting AI adding other pieces you'll more next couple months. About bring better their take advantage offer. challenge there? hacks we've heard ones fish tank vegas these attacks ways. text necessarily aren't trying cyber seeing people where they maybe plugging getting looking ways man middles, information seen, sure seen. growth number support. A IoT devices. somehow got mentality by gosh, put even though why. happening companies of, example, slide companies, product. onto internet. offer typically teach IP stack secure. Doesn't patches potentially become vulnerability. securing minutes. The back day, 10 years, 15 years knew was. physical buildings locations end elementary could distance learning center issue always becoming easy secure anymore. lives. ability posture layered, will. dealing Makes easier try implement support profiles. it? almost need layered approach hey, throw any virus machine everywhere. It's figure keep someone my buildings, connecting wireless. approaches why would say fits everywhere realize too budget. Not industries including UZTNA. zero trust cost comes those, budgets things. basic stuff K-12 eds. steps taken. sites usually tools SNMP scan, provided willing find they're using default passwords. community strings public private. parts segmenting gets most vendors capabilities. separate traffic your interfaces user interfaces. Many districts into, students faculty segments, will, student invented day download app Off internet, scan addresses poking in. segment minimum interface can't isolate out. taking capability Also, notifications, staying software patches. latest version. websites tell vulnerabilities Most manufacturers versions address those. config backups. freeware configuration for. Obviously, mentioned engine You'll bring, Also open door walk port level As example Instaport. instead leaving unused ports enabled waiting somebody connect. feature Instupport recognize device. shut down allow connect known device district build profiles within XIQ meet side. again, XIQ. Which no gives a, sense, poor man's neck, connectivity. network. Some advantages you. Is let move off. sitting middle Basically, application, example. On reason data center, applications there, systems Those things, locks camera Looking does happen cross routed wind breach, minimize happen. there's, first IPs segmented potential threat that'll with, biggest isolating cameras segments users lock automation sides. Uh-oh, happened? Hold There go. people, times they'll say, well, yeah, VLAN VLAN, VLANs, unless gone built ACLs You're picture illustrates each places VLANs. ACLs, sense close hacker looks it, hallway anything else benefits segmentation. premiums implemented segmentation Something about. drinking fire hose concepts interesting tom i traveling states throughout year. love chance answer questions further expand topics at, Gardner is, makes predict stats less than 1% organizations looked 2026, 30% strategy implementing this, impacts districts, ed, much enterprise takes hack six months discover hear news happened world sounded before detected were minimize, into. Struggle minimal limited talked earlier, top inherently box I've created problem Fabric Connect. another VSN virtual services box, poke holes segments. approach. challenges Distributed firewalls expensive. We've seen round. Fortinet distributing infrastructure. overlay technologies vendors, they've taken done layer overlaid VXLAN protocol properly secured configured. Nice Fabric, single automate forming joining hyper restrict levels allowed provision faster seven quicker between failures Multicast aspect conversations days, 7 point hop-by-hop provisioning fabrics together information. service configuring versus themselves. When outside fabric, to. provisions. Student let's hacked infiltrated. penetrate Even writing logically isolated fabric. step NAC calls control. For authenticating does, are. deploy infrastructure switch closet, cameras, Nacs camera, auto configure ports. moved 10, adjust based pieces. moves changes without IT involvement Once enabled, lock. adds security. involved High NACs work. leverage 802.1X MacAuth client Based identity, wanting role equals student, member, visitor. matches have. dynamically Next beyond UZ TNA. This concept Think ETNA basically, anything. least amount privileges them, assume breach. Someday, somehow, Somehow, i.e. Segmentation, breach its impact like. ZTNA Basically. mitigate these. as, Unless HCLs place. everything. Ztna 100% approaches. Again, company words, knack authentication. What Extreme's merged universal ZTNA. merges together. managing. My limit Have meaning SSID tie uz10a solution, wireless, communicate double configuration. easy, clean deployed. solutions, us consistent located, campus remote location. feel them. training 802.1x stuff. Cloud RAS okay, lock, profile. deploy. implementation. hardware licensing. worked hard implement. certifications said, attractive. macro micro edge. care providers live on-prem, determine look. end-to-end place locations, Universal applications. Phone support, IoT, xq grow manage. questions? Like is… talking, to, deeper dives technologies. hearing Thank yeah stepping contact information, Yeah. Yeah, send Kevin mentioned, mind, Sarah, ask, family works tech department University Northern Iowa. really? work quite often. do. That's son, Gavin. He's guy, think, be. Awesome. him bit. question won contest car went lake? that's… Did year again? light, though. through. mean, Lake's ice won. Interesting. found drive town, middle. Gavin deep. goes down, half clear underwater haul Right. Very good. thank all. Gotcha. you, guys. No. Let's see, here? a… week away deadline Wednesday. 471s E-rate Oddly enough, today's quiet. Tomorrow, booked tomorrow In Monday, Tuesday, Wednesday quiet yet schedule. change anyway. anyone power problems during deal with? did. do, wasn't nobody me. So. important. got… dozen emails ubs Wow. check Daniel, you? currently system process installed running cables doors sensors exterior underway. chasing discovered kids program Eaglecraft. file download, HTML file. allows Minecraft web browser. local content filter block And… playing Minecraft. researching prevent With MacBooks. Chromebooks setting JavaScript files. Chrome. They'll Safari. play then. noticed out, concept. browser Got proxy bypasses filter. anybody stumble wall. Researching locally tough stop. Anyway, Could you… types. directory executions files done. past, unfortunately executing reading browser's posted Being thing. work? locally. server Search Eagle Craft. That'll understanding, meg word Play Sort sounds thought up, Daniel. Google Drive, email No, no, website notes Yikes. Put flash drive, whatever. Wouldn't runs. like, runs completely browser, internet grab what? know. multiplayer multiplayer? Can they… not. after downloaded might servers. own server. See, wondering It'd laptop. firewall, packet capture once launch it'd Mm-hmm. future putting avoidance html execute scary concerning imagine require connection hopefully there'd hope. Sure. on, Daniel? really. watching stuff, boy. impressive MacBook. Runs MISTI, MS-T-Y. multiple cool. source. Yes, I, uh. Ended copying terms conditions, last certification page 471 dropped Notebook LM. 12 minute podcast turning conditions crazy. hoping four signing weeds reasonings extrapolated items block? Html, it'll Instead Googling something, find. dump spits usually. impressive. Now Mr. Foley, much. should, extra laying around. Proxmox Veeam supports proxmox sort built-in backup backup. compares Veeam. too, guess. Anything else? Excuse mute mic Bless righty. Des Moines days blizzard. husband eye surgery stuck. lucky snowy, um night. worried E rating approval signatures board meeting night personally. spring RFP approved via Zoom. office later POs I'll Laptops teachers replace. grade smart displays. But, hurry size that's, benefit Scott 471s. bid lower, lower paying so… external sure. enough lower. Last justify big difference. year, decision Um… firewall quotes screwy, wading partly yesterday, route Fortinet. quotes, but… leaning towards Ruckus. given idea truly be, I'd Nobody tacit whatever decide 25,000 signed approved, right? rule hotspots hotspot either. printed trip. compare apples oranges. anyway, happy possible sorted spreadsheets. that… husband's flying high. Good. busy, ready real again. funny blizzard Storm Lake normally you'd stuck motel room, gorgeous. snowing saying, dare home wind, saw semis ditches tipped thanks update, Sarah. here, week. Brainstorm APARA lined following Greg Gundersen Intellisy, 2023. they'd update product, upcoming SVPP grant. write grants free awarded grant April 3rd calendar. actually, schedule side group. Alrighty. showing will… Thursday 1 p.