Specifications
2
WWW.EXTREMENETWORKS.COM
Granular Policy Control
ExtremeControl enables the application of granular
controls over users and endpoints allowed on the
network. Users can enable secure BYOD, guest access
and loT by rolling out real-time policies based on
the security posture of devices. ExtremeControl
matches endpoints with attributes, such as user, time,
location, vulnerability, or access type, to create an
all-encompassing contextual identity. Role-based
identities follow a user, regardless from where or
how they connect to the network. They can be used
to enforce highly secure access policies to prevent
unauthorized users and compromised endpoints from
accessing the network.
Advanced Reporting
ExtremeControl makes it easy to monitor issues on
the network - all on one simple-to-read dashboard.
It sends advanced, customizable reports and alerts
about the authentication, guest access, onboarding,
device profiles and authentication, as well as end-
system health. When rolling out large projects,
reduce risk by testing new policies and using passive
policies for what-if-scenarios prior to enforcement.
ExtremeControl identifies threats by profiling and
tracking users and devices, as well as monitoring
the health and compliance of devices before and
after access. ExtremeControl can also accommodate
policy audits provided by third party integrated
MDM/EMM solutions to either ensure defined policies
are working or to enforce those policies. It can also
provide hit reports and the status regarding the
number of non-compliant and/or decommissioned
devices that have restricted network access with
additional context regarding where, when, and how.
ExtremeControl enables compliance auditors and
security teams with the relevant data they need to
make informed decisions regarding their network
access policies.
Ecosystem Integration
ExtremeControl is integrated with Extreme Networks’
ecosystem of partners to expand network security
and threat response. For example, ExtremeControl is
integrated with next-generation firewall solutions and
can orchestrate endpoint isolation and remediation
based on the alerts received. It shares contextual
information such as users, IP address and location for
powerful policy enforcement at perimeter firewalls.
Policies based on ID-IP mapping follow users.
ExtremeControl also oers third party policy support,
via user-based ACLs, ensuring granular control of the
entire network. To prevent the accessing of a client’s
network from non-compliant and un-enrolled devices
the integration with existing EMM/MDM partners,
such as VMware Workspace ONE UEM (Airwatch),
Citrix and Mobilelron is simplified.