Specifications
W W W.EXTREMENETW ORKS.COM 3
To prevent access of your network from non-compliant
and un-enrolled devices we make integration w ith our
EMM/ MDM partners, such as Airwatch, Citrix and
MobileIron easy. Additionally, integrated agent-based and
agentless security posture assessments w ith the ability to
integrate external solutions like scanners and endpoint
security solutions are available.
Onboarding for BYOD or guest policies is made easy and
secure with our self-service portal that offers texting and
social login based identity. It lets users manage devices
according to business policies. Devices are automatically
provisioned, profiled, and a security posture complying to
your security policies is set up. At the same time,
employees can get their devices onto the network without
requiring IT assistance.
Get Visibility Across Your Network with
Advanced Reporting and Alerting
ExtremeControl makes it easy to monitor issues on your
network ? all on one simple-to-read dashboard. It sends
you advanced, customizable reports and alerts about the
authentication, guest access, onboarding, device profiles
and authentication, as well as end-system health.
Reduce Security Vulnerabilities with
End-System Posture Assessment
ExtremeControl offers both, agent-based and agentless
assessment option. We can install either a persistent or
dissolvable agent on the client end system or the agent
can be downloaded via a captive portal website. It can
also be installed via a software distribution system such as
Group Policy or System Center Configuration Manager.
The agentless assessment does not require an installation
or running of any software on the end system.
Expand Security Integrations with
Next-Generation Firewalls
Our ExtremeControl is integrated with our ecosystem of
partners to expand network security and threat response.
Based on alerts from next-generation firewall solutions, we
orchestrate endpoint isolation and remediation. We share
contextual information such as users, IP address and
location for powerful policy enforcement at perimeter
firewalls. Policies based on ID-IP mapping follow users.
Appliance Options
Hardware Appliances
Our ExtremeControl appliances are rack-mountable
servers with all capabilities pre-installed.
Purchased applications (licensed separately) are activated
via license keys:
- The ExtremeControl Appliance IA-A-25, manages up
to 12K end systems
- The ExtremeControl Appliance -IA-A-30 5, manages up
to 24K end systems
Virtual Appliances
ExtremeControl can also be installed as a virtual
appliance that customers can download at purchase.
The ExtremeControl, virtual engines must be deployed on
a VMWare or Hyper-V server with a disk format of VHDX.
- The VMWare Management Center virtual engines are
packaged in the.OVA file format (defined by VMware)
- The Hyper-V Management Center virtual engines are
packaged in the .ZIP file format