ExtremeControl

ExtremeControl

Extreme Networks
MetaAccess

MetaAccess

OPSWAT
+
+

Related Products

  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Control D
    182 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    509 Ratings
    Visit Website
  • JDisc Discovery
    27 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website
  • Unimus
    31 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Securden Endpoint Privilege Manager
    6 Ratings
    Visit Website

About

Control users and devices across your networks with granular visibility and in-depth control. Customizing the onboarding of guests and IoT devices is easy and secure with predefined templates for non-IT personnel. Enables consistent policy roll-out across the entire network. Enhances security with agent-based and agentless assessment options. Control users and devices across your networks with granular visibility and in-depth control. Single pane of glass for wired and wireless. Secure, simple onboarding. Detailed profiling with access and app analytics data. Context-based policies. Policies based on security posture of IoT devices.

About

Security teams face challenges with increasing work-from-home scenarios, and lack visibility and control over what devices are accessing their network and if they're secure. Adding to the complexity is the myriad point products generally needed to gain this visibility and control. MetaAccess is one solution giving your organization secure network access and deep endpoint compliance. With this one platform approach, you can greatly simplify ongoing management, reducing time, effort and most importantly, risk. Common cybersecurity issues include Advanced Persistent Threats and Distributed Denial of Service (DDoS) attacks. Remote workers are particularly vulnerable to these attacks, and we need a more effective solution than the VPN of old. Software Defined Perimeter (SDP) increases security without increased cost or throughput degradation compared to VPN solutions, with a better overall user experience.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT Professionals and network adminstrators looking for a web application monitoring solution

Audience

Endpoint compliance and secure access solution for IT teams

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Extreme Networks
Founded: 1996
United States
www.extremenetworks.com/product/extremecontrol/

Company Information

OPSWAT
Founded: 2002
United States
www.opswat.com/products/metaaccess

Alternatives

Genian NAC

Genian NAC

GENIANS

Alternatives

Forescout

Forescout

Forescout Technologies
Aruba ClearPass

Aruba ClearPass

Aruba Networks
UTunnel VPN and ZTNA

UTunnel VPN and ZTNA

Secubytes LLC
UTunnel VPN and ZTNA

UTunnel VPN and ZTNA

Secubytes LLC
Perimeter 81

Perimeter 81

Check Point Software Technologies
Forescout

Forescout

Forescout Technologies
Ivanti NAC

Ivanti NAC

Ivanti

Categories

Categories

Network Access Control (NAC) Features

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Integrations

Box
Checkmk
Microsoft 365
Microsoft Azure
Mindflow
NetBeez
OPSWAT MetaDefender
Salesforce
SecureW2
VMware Cloud
WatchGuard WIPS

Integrations

Box
Checkmk
Microsoft 365
Microsoft Azure
Mindflow
NetBeez
OPSWAT MetaDefender
Salesforce
SecureW2
VMware Cloud
WatchGuard WIPS
Claim ExtremeControl and update features and information
Claim ExtremeControl and update features and information
Claim MetaAccess and update features and information
Claim MetaAccess and update features and information