Identity Engines provides a complete solution to ensure secure BYOD, guest and network access. The portfolio includes the following components:
The Ignition Server provides a central policy decision point that streamlines access management, improves security, provides reports, and lets network administrators apply policies.
Ignition Guest & IoT Manager
Ignition Guest Manager manages guest and visitor network access across wired and wireless access points. It lets you apply granular authorizations so guests can only access the network resources you choose.
Ignition Network Analytics
Ignition Analytics is an indispensable reporting application that delivers in-depth analysis of network activity, including ingress and usage. Use it to monitor changes in the networking environment and thereby make informed decisions.
Help ensure secure network access for employees, guests, and partners, even when they are using personal devices at work. In supporting the Bring-Your-Own-Device (BYOD) trend, securing network access is paramount.
Define and enforce who gets on the network, with what, to go where. Extreme Identity Engines gives you granular control of both users and devices.
Set the policies you need. For example, a user who connects wirelessly to the corporate network via a work-provided laptop is granted full access. However, the same user connecting via a personal iPad device is granted restricted access.
Integrate other vendors’ equipment. Our solution integrates with any vendor’s equipment, so you can add it to your network with confidence.
Cover All the Bases
Extensive and detailed network access and health checking identity management software helps you ensure both corporate policies and regulatory security compliance standards are met.
Access Control Management Made Simple
An intuitive interface lets you set up and control network access. Think who, what devices, from where, when, and for which resources.
Welcome Your Guests
Quickly provision guest access to your network while maintaining security and providing an audit trail. Anyone can create a guest access account in just a few seconds