Comprehensive policy for multi-vendor environments, providing detailed context into the user experience.
Mobile IAM, “BYOD Done Right,” is a comprehensive BYOD solution that provides total security, full IT control, and predictable network experience for all users. Mobile IAM addresses IT challenges being driven by today’s enterprise and campus mobility imperatives providing end-to-end visibility and control over individual users, devices and applications, in multi-vendor infrastructures.
Policy management is the most granular in the industry including per port, per device, QoS/priority, rate limit/shape, and more. Real time tracking and unique state change notification for over 45 attributes per device and user give IT maximum visibility into all network activity. It offers an open architecture for assessment (MDM integration) and threat response (Next Generation Firewall (NGFW), Security Information and Event Management (SIEM), Intrusion Prevention System (IPS)).
From Our Blog
Educational technology has revolutionized teaching and learning. With so much rapidly-changing technology in today’s classroom, it’s important to track the…
Purview, from Extreme Networks, provides good data analytics directly from a previously overlooked source: the network itself. With good data,…
BYOD and Guest Account Services Included
Automated BYOD registration allowing users to register their own devices using their credentials with no IT intervention. Guest registration access control features to assure secure guest networking without burdening IT staff. Also supports guest self-registration, sponsored registration, pre-registration, and support for contact verification via SMS or email.
Fine-Grained Configuration Options
NAC configuration options provide an unparalleled range of choices for fine-grained network control. These configuration options include time of day, location, authentication types, device and OS type, and end-system and user groups.
Provides user identity functionality including discovery, authentication, and role-based access controls. The process of managing the user’s lifecycle (e.g., enrollment, role changes, termination) can be automated and linked to other business processes with LDAP and RADIUS integration.
End-point Baselining and Monitoring
Provides agent-based or agent-less end-point assessment capabilities to determine the security posture of connecting devices. It is aligned with industry standards, works with multiple assessment servers, authentication servers and security software agents to match the needs of organizations who may have existing assessment technology.
Open Architecture for Assessment
Allows easy integration with other third-party network management tools for MDM integration, threat response (Next Generation Firewall (NGFW), Security Information and Event Management (SIEM), Intrusion Prevention System (IPS)), and more.
Available as a Physical or Virtual Appliance
Provides the flexibility to meet any installation requirement.
Mobile IAM is “BYOD Done Right,” a comprehensive BYOD solution that provides total security, full IT control and predictable network experience for all users. Mobile IAM addresses:
- Centrally manage and control the security posture of all devices connecting to the network, including employee bring-your-own-device (BYOD)
- Offers the flexibility to choose whether or not to restrict access for guests/contractors to public Internet services only
- Managed guest access control with sponsorship, SMS verification, pre-registration, and other options
- Comprehensive dashboard reporting and advanced notification engine
- Enables the homogeneous configuration of policies across multiple switch and wireless access point vendors. This capability significantly reduces the burden of policy lifecycle management and eases Mobile IAM deployment in wired and wireless heterogeneous infrastructures
- Works in any environment – Extreme only network, Extreme and third-party network, and non-Extreme network
- Protects existing infrastructure investments since it does not require the deployment of new switching hardware or that agents be installed on all end-systems
- Protect critical corporate data by restricting and/or controlling unauthorized access to network resources
- Address compliance and regulatory requirements by control access to sensitive data and then providing comprehensive reporting on user activity, additionally reporting can be exported to other third-party reporting tools
- Automate end-point isolation, quarantine, and remediation, plus ongoing threat analysis, prevention, and containment
- Performs multi-user, multi-method authentication, vulnerability assessment, and assisted remediation
- Multiple options on how to handle authenticated internal users/devices that do not pass the security posture assessment
Mobile IAM Hardware Appliance
Height: 1.68” (4.26 cm)
Width: 18.99” (includes rack latches) (48.24 cm)
Depth: 30.39” (includes PSU handles and bezel) (77.2 cm)
Weight: 39 lbs (17.69 kg)
Wattage: 717 Watts (high output), 570 Watts (Energy Smart)
Voltage: 90-264 VAC, auto ranging, 47-63Hz
Operating Temperature: 10° C to 35° C (50° F to 95° F) with a maximum temperature gradation of 10° C per hour
Note: For altitudes above 2,950 feet, the maximum operating temperature is de-rated 1° F/550 ft
Storage Temperature: -40° C to 65° C (-40°F to 149° F) with a maximum temperature gradation of 20° C per hour
Operating Humidity: 20% to 80% (non-condensing) with a maximum humidity gradation of 10% per hour
Mobile IAM Virtual Appliance
The virtual appliance is a software image that runs on a virtual machine.
The virtual appliance is packaged in the .OVA file format defined by VMware and must be deployed on either a VMware ESX™ 4.0 or 4.1 server or a VMware ESXi™ 4.0 or 4.1 server with vSphere™ 4.0 or 4.1 client.
The virtual appliance uses the following resources from the server it is installed on:
- 12GB of memory
- Four CPUs
- Two network adapters
- 40GB of thick-provisioned hard drive space
Mobile IAM Management
NetSight provides the management capabilities for Mobile IAM. NetSight is available for 32-bit operating systems:
- Windows (qualified on the English version of the operating systems)
- Windows Server® 2003 with Service Pack 2
- Windows XP® with Service Pack 2 or 3
- Windows Server® 2008 Enterprise
- Windows Server® 2008
- Enterprise 64-bit (as 32-bit application), Windows Server® 2008 R2
- Windows® 7
- Linux Red Hat Enterprise Linux WS and ES v4 and v5
- SuSE Linux versions 10 and 11
- MAC OS X® (remote NetSight client only), Snow Leopard®
NetSight Server and Client Hardware Requirements
- Minimum: Dual-Core 2.4GHz Processor, 2GB RAM, 5GB Free Disk Space
- Medium: Quad-Core 2.66GHz Processor, 4GB RAM, 10GB Free Disk Space
- Large: Dual Quad-Core Intel® Xeon CPU E5530 2.4GHz Processors (running Red Hat Enterprise Linux ES), 6GB RAM, 20GB Free Disk Space
NetSight Virtual Appliance
The Virtual appliance is a software image that runs on a virtual machine. The virtual appliance is packaged in the .OVA file format defined by VMware an must be deployed on either a VMware ESX™ 4.0 or 4.1 server or a VMware ESXi™ 4.0 or 4.1 server with vSphere™ 4.0 or 4.1 client.
- 8GB of memory
- Four CPUs
- Two network adapters
- 60GB of thick-provisioned hard drive space
- Recommended: Dual-Core 2.4GHz Processor, 2GB RAM
- Free Disk Space: 100MB (User’s home directory requires 50MB for file storage)
- Java Runtime Environment (JRE) 6 (also referred to as 1.6) or higher
Supported Web Browsers:
- Internet Explorer versions 7, 8, and 9
- Mozilla Firefox 2.0 and 3.0