Contact UsContact UsContact Us

Identity Engines Portfolio

Say Yes to “Bring Your Own Device” While Maintaining Control of the Network

Click to talk to a network expert

Request a Demo

Identity Engines provides a complete solution to ensure secure BYOD, guest and network access. The portfolio includes the following components:

Ignition Server

The Ignition Server provides a central policy decision point that streamlines access management, improves security, provides reports, and lets network administrators apply policies.

Ignition Guest Manager

Ignition Guest Manager manages guest and visitor network access across wired and wireless access points. It lets you apply granular authorizations so guests can only access the network resources you choose.

Ignition Posture

Ignition Posture introduces various policy controls and enforces network provisioning options for each type of user functionality, rather than forcing all-or-nothing control. Run it on all major desktop OSs.

Ignition Analytics

Ignition Analytics is an indispensable reporting application that delivers in-depth analysis of network activity, including ingress and usage. Use it to monitor changes in the networking environment and thereby make informed decisions.

Ignition Access Portal

Ignition Access Portal establishes a portal that intercepts traffic from employees and guests, simplifying how devices authenticate and connect to the network while providing new tools to monitor, manage and control the level of access that is provided, including detailed visibility into the profiles of individual devices.

Help ensure secure network access for employees, guests, and partners, even when they are using personal devices at work. In supporting the Bring-Your-Own-Device (BYOD) trend, securing network access is paramount.

Define and enforce who gets on the network, with what, to go where. Extreme Identity Engines gives you granular control of both users and devices.

Set the policies you need. For example, a user who connects wirelessly to the corporate network via a work-provided laptop is granted full access. However, the same user connecting via a personal iPad device is granted restricted access.

Integrate other vendors’ equipment. Our solution integrates with any vendor’s equipment, so you can add it to your network with confidence.

Cover All the Bases

Extensive and detailed network access and health checking identity management software helps you ensure both corporate policies and regulatory security compliance standards are met.

Access Control Management Made Simple

An intuitive interface lets you set up and control network access. Think who, what devices, from where, when, and for which resources.

Welcome Your Guests

Quickly provision guest access to your network while maintaining security and providing an audit trail. Anyone can create a guest access account in just a few seconds

A New Day in Networking. Extreme Closes the Avaya Deal.

Find out what this acquisition means for customers and partners of Extreme Networks.

Read moreor