background image

Extreme Networks Feature Brief

Challenges leading to reduced enterprise effectiveness:

•  Handling access control of user accounts and 

rights on-demand is labor-intensive

•  Adapting access rights to changing organizational 

roles is time-consuming

•  Increasing network traffic noise interrupts business 

productivity and compromises network integrity

•  Multiple-point security products, often added as a 

way to segment the network, require lengthy 
configuration and manual labor

•  Ensuring that regulatory compliance meets audit 

guidelines is a complex process and requires 
extensive preparation

Challenges leading to security and compliance deficiency:

•  No transparency of enterprise-wide access rights 

is currently available

•  Firewalls’ enforcement points create more internal 

network entry points with more complex policies 

•  Troubleshooting can take longer and amplify 

security risks when multiple devices and applica-
tions are involved

•  Implementing the compliance framework is  

not automated

•  Monitoring wrongfully accumulated access rights 

is difficult

The Solution

Extreme Networks

®

 Identity Manager feature provides a 

best-of-breed solution to bring user profiles, device, 
location, and presence awareness to network managers 
while enabling enforcement of corporate policies at 
every network point of entry. Identity Manager provides 
network-wide viewing and reporting of identities and 
also helps administrators manage network-wide, 
role-based policies for both users and devices. Applying 
that intelligence consistently across the network enables 
seamless mobility and on-demand access to applications 
to maintain business continuity.   

The Situation

As companies routinely handle extremely sensitive and private 
information for individuals and businesses, they are also faced with 
the challenge of finding ways to reduce operational risks associated 
with governing the integrity, security, and privacy of the network 
and data they manage. Not only does the challenge of identity 
management move up and down the stack from the hardware layer 
up to the business application level, but it also moves outside those 
boundaries to the cloud and virtual computing environments.

The Challenges

Many businesses today are operating in a climate of strict 
compliance, and are under increasing pressure to achieve 
enterprise effectiveness. They struggle with managing access 
rights for enterprise employees, outsourced staff, consultants, 
and business partners across multiple systems, applications, and 
platforms used for the business. Organizational changes and 
rapid workforce growth create a challenge for IT departments in 
consistently managing wide access rights for users while ensuring 
access to the right applications at the right time and location. 

Companies are increasingly driven by the need to find cost- 
effective ways to align to business processes, improve productivity, 
and maintain application availability all while confirming network 
access requirements. For most enterprises, the ability to control 
access and monitor the network user, device, and location is 
currently very limited.

Extreme Networks Identity Manager

Reviews: