Extreme Networks Feature Brief
Challenges leading to reduced enterprise effectiveness:
• Handling access control of user accounts and
rights on-demand is labor-intensive
• Adapting access rights to changing organizational
roles is time-consuming
• Increasing network traffic noise interrupts business
productivity and compromises network integrity
• Multiple-point security products, often added as a
way to segment the network, require lengthy
configuration and manual labor
• Ensuring that regulatory compliance meets audit
guidelines is a complex process and requires
extensive preparation
Challenges leading to security and compliance deficiency:
• No transparency of enterprise-wide access rights
is currently available
• Firewalls’ enforcement points create more internal
network entry points with more complex policies
• Troubleshooting can take longer and amplify
security risks when multiple devices and applica-
tions are involved
• Implementing the compliance framework is
not automated
• Monitoring wrongfully accumulated access rights
is difficult
The Solution
Extreme Networks
®
Identity Manager feature provides a
best-of-breed solution to bring user profiles, device,
location, and presence awareness to network managers
while enabling enforcement of corporate policies at
every network point of entry. Identity Manager provides
network-wide viewing and reporting of identities and
also helps administrators manage network-wide,
role-based policies for both users and devices. Applying
that intelligence consistently across the network enables
seamless mobility and on-demand access to applications
to maintain business continuity.
The Situation
As companies routinely handle extremely sensitive and private
information for individuals and businesses, they are also faced with
the challenge of finding ways to reduce operational risks associated
with governing the integrity, security, and privacy of the network
and data they manage. Not only does the challenge of identity
management move up and down the stack from the hardware layer
up to the business application level, but it also moves outside those
boundaries to the cloud and virtual computing environments.
The Challenges
Many businesses today are operating in a climate of strict
compliance, and are under increasing pressure to achieve
enterprise effectiveness. They struggle with managing access
rights for enterprise employees, outsourced staff, consultants,
and business partners across multiple systems, applications, and
platforms used for the business. Organizational changes and
rapid workforce growth create a challenge for IT departments in
consistently managing wide access rights for users while ensuring
access to the right applications at the right time and location.
Companies are increasingly driven by the need to find cost-
effective ways to align to business processes, improve productivity,
and maintain application availability all while confirming network
access requirements. For most enterprises, the ability to control
access and monitor the network user, device, and location is
currently very limited.
Extreme Networks Identity Manager