ExtremeApplications

Identity Engines

Secure Role-based Network Access

Securely control access to your network

  • Centralized access security
  • Secure guest access
  • Validated remote access

Improve Security with Granular Control

Offers guest access, role-based access control, and compartmentalization of the network to segment and protect data.

Reduce Investment Costs

Supports current network infrastructures and identity stores. Offers investment protection via a standards-based solution.

Simplify Policy Roll-out

Provides clear centralized policy decision and simplifies policy creation through virtual groups.

Extreme Identity Engines Technical Specifications