Specifications
W W W.EXTREMENETW ORKS.COM 2
Secure Your Network with Granular
Policy Control and In-Depth Visibility
ExremeControl enables you to apply granular controls
over who, what, w hen, where, and how endpoints are
allowed on the network. You can enable secure BYOD,
guest access and IoT by rolling out real-time policies
based on the security posture of devices. ExtremeControl
matches endpoints with attributes, such as user, time,
location, vulnerability, or access type, to create an
all-encompassing contextual identity. Role based identities
follow a user, no matter from where or how she connects
to the network. They can be used to enforce highly secure
access policies.
Setting granular policies and scaling them across your
network automatically, makes it possible to comply to
internal policies and external regulations. With one click
you can enforce context-driven policies across devices for
QoS, bandw idth and other parameters and align them to
your business imperatives. Advanced reporting of all user
valid authentications and failures with a real-time state
table of all connected users and devices alerts you to
potential issues.
In the face of constant network transformation you can
use micro segmentation for consistent security w ithout
the need for complex network changes. When rolling out
large projects, reduce risk by testing new policies and
using passive policies for what-if-scenarios prior to
enforcement. ExtremeControl lets you identify threats by
profiling and tracking users and devices, as well as
monitoring the health and compliance of devices before
and after access. It assesses your network with policy
audits and hit reports.
ExtremeControl also offers third party policy support, via
user-based ACLs, ensuring granular control of your entire
network, including Extreme and third party equipment.
Super Easy and Secure Onboarding
for Guests and IoT Devices
Our Guest and IoT Manger enables IT to set up easy to use
onboarding templates that enables non-technical staff to
provision new users and devices. Additionally, we offer a
set of REST APIs to allow programmatic onboarding of
users and devices.
To provide a smooth experience for visitors the Guest and
IoT Manager also includes an MS Outlook plugin that
automatically creates a network access account to people
based on Microsoft Outlook Calendar events.
Our identity-aware solution automatically manages
expiration, account validity and time control for guest
accounts without any IT involvement. Securely and easily
onboard guests and BYOD devices with extensive
customization, branding and sponsor-based approvals.
Built-in device profiling using various internal and
external profiling techniques makes sure only devices that
comply to your policies can access your network. Users
can log into their Yahoo or Salesforce account to complete
guest registration.
Figure 2: Microsoft Outlook Calendar Plugin
Figure 1: Guest and IoT Manager