Contact UsContact UsContact Us

Mobile IAM

BYOD done right

  • Discovery and easy onboarding of BYOD users
  • Supports multi-vendor environments, including MDM
  • Comprehensive dashboard for advanced analytics

Click to talk to a network expert

Request a Demo

Comprehensive policy for multi-vendor environments, providing detailed context into the user experience.

Mobile IAM, “BYOD Done Right,” is a comprehensive BYOD solution that provides total security, full IT control, and predictable network experience for all users. Mobile IAM addresses IT challenges being driven by today’s enterprise and campus mobility imperatives providing end-to-end visibility and control over individual users, devices and applications, in multi-vendor infrastructures.

Policy management is the most granular in the industry including per port, per device, QoS/priority, rate limit/shape, and more. Real time tracking and unique state change notification for over 45 attributes per device and user give IT maximum visibility into all network activity. It offers an open architecture for assessment (MDM integration) and threat response (Next Generation Firewall (NGFW), Security Information and Event Management (SIEM), Intrusion Prevention System (IPS)).

From Our Blog

Improving Education With Network Data Analytics

Educational technology has revolutionized teaching and learning. With so much rapidly-changing technology in today’s classroom, it’s important to track the…

Read More

Vision. Action. Insight. The Immediate Results of Purview

Purview, from Extreme Networks, provides good data analytics directly from a previously overlooked source: the network itself.  With good data,…

Read More

BYOD and Guest Account Services Included

Automated BYOD registration allowing users to register their own devices using their credentials with no IT intervention. Guest registration access control features to assure secure guest networking without burdening IT staff. Also supports guest self-registration, sponsored registration, pre-registration, and support for contact verification via SMS or email.

Fine-Grained Configuration Options

NAC configuration options provide an unparalleled range of choices for fine-grained network control. These configuration options include time of day, location, authentication types, device and OS type, and end-system and user groups.

Identity-Aware Networking

Provides user identity functionality including discovery, authentication, and role-based access controls. The process of managing the user’s lifecycle (e.g., enrollment, role changes, termination) can be automated and linked to other business processes with LDAP and RADIUS integration.

End-point Baselining and Monitoring

Provides agent-based or agent-less end-point assessment capabilities to determine the security posture of connecting devices. It is aligned with industry standards, works with multiple assessment servers, authentication servers and security software agents to match the needs of organizations who may have existing assessment technology.

Open Architecture for Assessment

Allows easy integration with other third-party network management tools for MDM integration, threat response (Next Generation Firewall (NGFW), Security Information and Event Management (SIEM), Intrusion Prevention System (IPS)), and more.

Available as a Physical or Virtual Appliance

Provides the flexibility to meet any installation requirement.

Mobile IAM is “BYOD Done Right,” a comprehensive BYOD solution that provides total security, full IT control and predictable network experience for all users. Mobile IAM addresses:

  • Centrally manage and control the security posture of all devices connecting to the network, including employee bring-your-own-device (BYOD)
  • Offers the flexibility to choose whether or not to restrict access for guests/contractors to public Internet services only
  • Managed guest access control with sponsorship, SMS verification, pre-registration, and other options
  • Comprehensive dashboard reporting and advanced notification engine
  • Enables the homogeneous configuration of policies across multiple switch and wireless access point vendors. This capability significantly reduces the burden of policy lifecycle management and eases Mobile IAM deployment in wired and wireless heterogeneous infrastructures
  • Works in any environment – Extreme only network, Extreme and third-party network, and non-Extreme network
  • Protects existing infrastructure investments since it does not require the deployment of new switching hardware or that agents be installed on all end-systems
  • Protect critical corporate data by restricting and/or controlling unauthorized access to network resources
  • Address compliance and regulatory requirements by control access to sensitive data and then providing comprehensive reporting on user activity, additionally reporting can be exported to other third-party reporting tools
  • Automate end-point isolation, quarantine, and remediation, plus ongoing threat analysis, prevention, and containment
  • Performs multi-user, multi-method authentication, vulnerability assessment, and assisted remediation
  • Multiple options on how to handle authenticated internal users/devices that do not pass the security posture assessment


Mobile IAM Hardware Appliance

Physical Specifications
Height: 1.68” (4.26 cm)
Width: 18.99” (includes rack latches) (48.24 cm)
Depth: 30.39” (includes PSU handles and bezel) (77.2 cm)
Weight: 39 lbs (17.69 kg)

Wattage: 717 Watts (high output), 570 Watts (Energy Smart)
Voltage: 90-264 VAC, auto ranging, 47-63Hz

Environmental Specifications
Operating Temperature: 10° C to 35° C (50° F to 95° F) with a maximum temperature gradation of 10° C per hour

Note: For altitudes above 2,950 feet, the maximum operating temperature is de-rated 1° F/550 ft

Storage Temperature: -40° C to 65° C (-40°F  to 149° F) with a maximum temperature gradation of 20° C per hour
Operating Humidity: 20% to 80% (non-condensing) with a maximum humidity gradation of 10% per hour

Mobile IAM Virtual Appliance

The virtual appliance is a software image that runs on a virtual machine.
The virtual appliance is packaged in the .OVA file format defined by VMware and must be deployed on either a VMware ESX™ 4.0 or 4.1 server or a VMware ESXi™ 4.0 or 4.1 server with vSphere™ 4.0 or 4.1 client.

The virtual appliance uses the following resources from the server it is installed on:

  • 12GB of memory
  • Four CPUs
  • Two network adapters
  • 40GB of thick-provisioned hard drive space
Mobile IAM Management

NetSight provides the management capabilities for Mobile IAM. NetSight is available for 32-bit operating systems:

  • Windows (qualified on the English version of the operating systems)
  • Windows Server® 2003 with Service Pack 2
  • Windows XP® with Service Pack 2 or 3
  • Windows Server® 2008 Enterprise
  • Windows Server® 2008
  • Enterprise 64-bit (as 32-bit application), Windows Server® 2008 R2
  • Windows® 7
  • Linux Red Hat Enterprise Linux WS and ES v4 and v5
  • SuSE Linux versions 10 and 11
  • MAC OS X® (remote NetSight client only), Snow Leopard®
NetSight Server and Client Hardware Requirements

NetSight Server

  • Minimum: Dual-Core 2.4GHz Processor, 2GB RAM, 5GB Free Disk Space
  • Medium: Quad-Core 2.66GHz Processor, 4GB RAM, 10GB Free Disk Space
  • Large: Dual Quad-Core Intel® Xeon CPU E5530 2.4GHz Processors (running Red Hat Enterprise Linux ES), 6GB RAM, 20GB Free Disk Space
NetSight Virtual Appliance

The Virtual appliance is a software image that runs on a virtual machine. The virtual appliance is packaged in the .OVA file format defined by VMware an must be deployed on either a VMware ESX™ 4.0 or 4.1 server or a VMware ESXi™ 4.0 or 4.1 server with vSphere™ 4.0 or 4.1 client.

  • 8GB of memory
  • Four CPUs
  • Two network adapters
  • 60GB of thick-provisioned hard drive space

NetSight Client

  • Recommended: Dual-Core 2.4GHz Processor, 2GB RAM
  •  Free Disk Space: 100MB (User’s home directory requires 50MB for file storage)
  • Java Runtime Environment (JRE) 6 (also referred to as 1.6) or higher

Supported Web Browsers:

  • Internet Explorer versions 7, 8, and 9
  • Mozilla Firefox 2.0 and 3.0