SHARE
Facebook X Pinterest WhatsApp

Extreme Networks Applies Analytics to Wireless Networks

Top Five Things You Should Know About Network Forensics Organizations today routinely give people access to wireless networks either as a way to increase affinity or simply generate some revenue. But not many of them have a whole lot of visibility into what transpires on those networks. Extreme Networks is trying to change all that […]

Written By
MV
Mike Vizard
Feb 5, 2014
Slide Show

Top Five Things You Should Know About Network Forensics

Organizations today routinely give people access to wireless networks either as a way to increase affinity or simply generate some revenue. But not many of them have a whole lot of visibility into what transpires on those networks.

Extreme Networks is trying to change all that with the release this week of Purview, an appliance based on custom CoreFlow2 ASICs developed by Extreme Networks to power an analytics application that can collect data from any wireless network. At launch, Purview customizable signature set can identify 13,000 application fingerprints across 7,000 applications.

Mike Leibovitz, director of mobility and applications at Extreme Networks, says Purview, which was used extensively during Super Bowl XLVIII, provides organizations with the data they need to take an action while the customer is actively engaged on their network. While Purview is not designed to collect personally identifiable information (PII) that the customer has not already opted to provide using, for example, a mobile application, it does inform organizations what websites or types of applications people are using on their network.

In the case of a retailer, for example, Leibovitz says Purview could be used to collect actionable data from customers. It could help determine how often shoppers were checking out a competitor’s website while visiting a particular store, or gauge how effective a particular offer delivered via a mobile application was while customers were still in the store.

In addition to retail applications, Leibovitz says that Purview could be used to troubleshoot network management and identify potential security issues.

As an element of a larger Big Data strategy, Leibovitz says Purview provides a way for organizations to more easily capture data that could feed back into a variety of Big Data applications. While all data is increasingly becoming valuable, the fresher the data, the more valuable it is likely to be.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.