ExtremeControl Identity & Access Management is a NAC-class solution that perfectly meets the needs of enterprises and institutions in securing the network access layer.

A solution for wired and wireless LANs

  • Physical or virtual deployment – ExtremeControl IAM, available as a physical as well as a virtual gateway that mediates authentication (MAC, 802.1X – AD/LDAP, RADIUS), also enables the implementation of a flexible browser portal
  • Role-based access control, detection, and authentication – Extreme Networks can meet all your network access control needs. Integration of the system with other solutions (such as firewall systems, SIEM, MDM, and building access control) significantly increases the degree of automation of the processes of granting access to the network, and cooperation with active LAN devices from other manufacturers allows you to gain visibility
  • In-depth user activity reporting – full visibility of devices connecting to the network, extensive profiling capabilities for wired and wireless devices, dynamic assignment of security policies, tying together VLAN, ACL, and QoS, among others, as well as the ability to verify compliance and vulnerability of end systems

Features of ExtremeControl Identity & Access Management:

BYOD services and guest accounts included

  • Automated BYOD registration to allow users to register their own devices using credentials without IT intervention
  • Support for self-registration of visitors, sponsored registration, pre-registration, and support for contact verification via SMS or email

Detailed configuration options

  • A wide range of choices for precise network control (including location, authentication types, device and operating system type, and end system and user groups)

Identity-Aware Networking

  • User identity functionality, including role-based detection, authentication, and access control
  • The user lifecycle management process (e.g., registration, role change, termination) can be automated and linked to other business processes through LDAP and RADIUS integration

Endpoint monitoring

  • Endpoint assessment capabilities to determine the security status of interconnecting devices
  • Open architecture
  • Enables easy integration with other third-party network management tools for MDM integration, threat response, etc.