Identity Engines provides a complete solution to ensure secure BYOD, guest and network access. The portfolio includes the following components:
The Ignition Server provides a central policy decision point that streamlines access management, improves security, provides reports, and lets network administrators apply policies.
Ignition Guest Manager
Ignition Guest Manager manages guest and visitor network access across wired and wireless access points. It lets you apply granular authorizations so guests can only access the network resources you choose.
Ignition Posture introduces various policy controls and enforces network provisioning options for each type of user functionality, rather than forcing all-or-nothing control. Run it on all major desktop OSs.
Ignition Analytics is an indispensable reporting application that delivers in-depth analysis of network activity, including ingress and usage. Use it to monitor changes in the networking environment and thereby make informed decisions.
Ignition Access Portal
Ignition Access Portal establishes a portal that intercepts traffic from employees and guests, simplifying how devices authenticate and connect to the network while providing new tools to monitor, manage and control the level of access that is provided, including detailed visibility into the profiles of individual devices.
Help ensure secure network access for employees, guests, and partners, even when they are using personal devices at work. In supporting the Bring-Your-Own-Device (BYOD) trend, securing network access is paramount.
Define and enforce who gets on the network, with what, to go where. Extreme Identity Engines gives you granular control of both users and devices.
Set the policies you need. For example, a user who connects wirelessly to the corporate network via a work-provided laptop is granted full access. However, the same user connecting via a personal iPad device is granted restricted access.
Integrate other vendors’ equipment. Our solution integrates with any vendor’s equipment, so you can add it to your network with confidence.
Cover All the Bases
Extensive and detailed network access and health checking identity management software helps you ensure both corporate policies and regulatory security compliance standards are met.
Access Control Management Made Simple
An intuitive interface lets you set up and control network access. Think who, what devices, from where, when, and for which resources.
Welcome Your Guests
Quickly provision guest access to your network while maintaining security and providing an audit trail. Anyone can create a guest access account in just a few seconds