Contact Details

Extreme Networks

Located in United States, California, San Jose

Founded in 1996

  • Free trial available
  • Free version available
Search

Compare product ratings to similar products Find other products with similar features to suit your business

contact us

Have you used this product before? Find other productswith similar features to suit your business

Write a review

Does this product belong to you

Alternatives to Extreme Network

Aruba secure

Aruba secure

No ratings yet!
Device42

Device42

No ratings yet!
Sophos Firewall

Sophos Firewall

No ratings yet!
Cisco Identity service engine

Cisco Identity service engine

No ratings yet!
Foxpass

Foxpass

No ratings yet!
Barracuda

Barracuda

No ratings yet!
Forescout

Forescout

No ratings yet!
Fortinet NAC

Fortinet NAC

No ratings yet!
OPSWAT

OPSWAT

No ratings yet!
portnox

portnox

No ratings yet!
View all alternatives

What is Extreme Network?

Show Less

Contact Details

Extreme Networks

Located in United States, California, San Jose

Founded in 1996

  • Free trial available
  • Free version available

Top Industries Represented

Data from Grid Report for Network Access Control Software

View grid data

Deployment & Support

Deployment

  • Cloud, Saas, Web-based
  • Desktop-mac
  • Desktop-Windows
  • Desktop-Linux
  • Desktop-Chromebook
  • On Promise Windows
  • On Premise Linux
  • Mobile-Android
  • Mobile-Iphone
  • Mobile-Ipad

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live Recap)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Extreme Network Pricing

Check out our offers for each of our packages to get best out of the software

Visit us on our website to know more

Get a custom quote

Extreme Network Features

Primary Features

Access Controls/Permissions

Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.

Dashboard

A dashboard is a type of graphical user interface which often provides at-a-glance views of key performance indicators relevant to a particular objective or business process.

Policy Management

Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.

Remote Access/Control

Remote access control refers to the ability to monitor and control access to a computer or network (such as a home computer or office network computer) anywhere and anytime.

Compliance Management

Compliance management is the ongoing process of monitoring and assessing systems to ensure they comply with industry and security standards, as well as corporate and regulatory policies and requirements.

Password Management

Password management is a system that allows users to store and access passwords securely.

Credential Management

Credential Management is an established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI).

Third Party Integrations

A third-party integration is a connection between two or more apps that is built on an external platform.

Data Visualization

Data visualization is the practice of translating information into a visual context, such as a map or graph, to make data easier for the human brain to understand and pull insights from.

Secondary Features

  • Audit Management
  • Audit Trail
  • Real Time Monitoring
  • Crm
  • Patch Management
  • Authentication
  • Capacity Management

Compare with Similar Products

Aruba secure

Aruba secure

Device42

Device42

Sophos Firewall

Sophos Firewall

Cisco Identity service engine

Cisco Identity service engine

Foxpass

Foxpass

Barracuda

Barracuda

Forescout

Forescout

Fortinet NAC

Fortinet NAC

OPSWAT

OPSWAT

portnox

portnox

Show Comparisons

Resources