ExtremeControlExtreme Networks
|
||||||
Related Products
|
||||||
About
Control users and devices across your networks with granular visibility and in-depth control. Customizing the onboarding of guests and IoT devices is easy and secure with predefined templates for non-IT personnel. Enables consistent policy roll-out across the entire network. Enhances security with agent-based and agentless assessment options. Control users and devices across your networks with granular visibility and in-depth control. Single pane of glass for wired and wireless. Secure, simple onboarding. Detailed profiling with access and app analytics data. Context-based policies. Policies based on security posture of IoT devices.
|
About
Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist. Support network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics. Scale hardware performance to speeds up to 100 Gbps and leverage data from multiple products. Find stealthy botnets, worms, and reconnaissance attacks hiding across the network landscape. Collect flow data from switches and routers and integrate with Network Threat Behavior Analysis to correlate unusual network behavior. Discover and block advanced threats on-premises, in virtual environments, software-defined data centers, and private and public clouds. Gain east-west network visibility and threat protection across virtualized infrastructure and data centers.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT Professionals and network adminstrators looking for a web application monitoring solution
|
Audience
IT Professionals and Network Professionals in need of an advanced Intrusion Detection and Prevention solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationExtreme Networks
Founded: 1996
United States
www.extremenetworks.com/product/extremecontrol/
|
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/products/intrusion-prevention-system/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
Network Access Control (NAC) Features
Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access
|
||||||
Integrations
CYREBRO
Checkmk
Mindflow
NetBeez
Nexpose
Rackspace OpenStack
SecureW2
WatchGuard WIPS
|
Integrations
CYREBRO
Checkmk
Mindflow
NetBeez
Nexpose
Rackspace OpenStack
SecureW2
WatchGuard WIPS
|
|||||
|
|
|