Extreme Networks E4G Series Manual de usuario Pagina 8

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 8
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 7
WWW.EXTREMENETWORKS.COM
http://www.ExtremeNetworks.com/contact Phone +1-408-579-2800
©2014 Extreme Networks, Inc. All rights reserved. Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of Extreme Networks, Inc.
in the United States and/or other countries. All other names are the property of their respective owners. For additional information on Extreme Networks Trademarks
please see http://www.extremenetworks.com/about-extreme/trademarks.aspx. Specifications and product availability are subject to change without notice. 7719-0214
Pocket Guide 8
Product Name and Role Key Values Key Dierentiators
Network Access Control (NAC)
Extreme NAC is a standards-based,
multi-vendor interoperable NAC
solution for wired and wireless LAN
and VPN users. It provides business-
oriented visibility and control over
individual users and applications in
multi-vendor infrastructures.
Provides user identity functionality including
discovery, authentication and role based
access controls
Protects corporate data by proactively
preventing unauthorized users, compromised
endpoints, and other vulnerable systems from
accessing the network
Address compliance and regulatory
requirements by control access to sensitive
data and then providing comprehensive
reporting on user activity. Additionally
reporting data can be exported to other third
party reporting tools
Flexibility to choose between virtual and
physical NAC appliances to best meet the
needs of the business
Investment protection - Can be easily deployed
in an Extreme only, mixed or non-Extreme
environment providing exceptional access
control in all cases
Configuration options provide an unparalleled
range of choices for fine grained network control
including time of day, location, authentication
types, device and OS type, and end system and
user groups
Automated guest access control with
sponsorship, SMS verification, pre-registration,
and other options
Easy integration with third party management
tools for MDM, Next Generation Firewall (NGFW),
SEIM, IPS and more
Ability to link with other business processes such
as LDAP and RADIUS
Vista de pagina 7
1 2 3 4 5 6 7 8

Comentarios a estos manuales

Sin comentarios