ExtremeControlExtreme Networks
|
R81.10Check Point Software Technologies
|
|||||
Related Products
|
||||||
About
Control users and devices across your networks with granular visibility and in-depth control. Customizing the onboarding of guests and IoT devices is easy and secure with predefined templates for non-IT personnel. Enables consistent policy roll-out across the entire network. Enhances security with agent-based and agentless assessment options. Control users and devices across your networks with granular visibility and in-depth control. Single pane of glass for wired and wireless. Secure, simple onboarding. Detailed profiling with access and app analytics data. Context-based policies. Policies based on security posture of IoT devices.
|
About
R81.10 is the industry’s most advanced threat prevention and security management software that delivers uncompromising simplicity and consolidation across the enterprise. Providing autonomous prevention, R81.10 aims to relieve the IT admins daily effort and make managing cyber security the simplest it’s ever been. Whether it is deploying the latest technologies and security to protect the organization or expertly crafting security policies, R81.10 enables enterprises to be their best. Automatically allocate hardware and core resources based on traffic characteristics. Provide higher levels of performance and security. Check Point offers, for the first time, an all-inclusive security management architecture delivered from the cloud designed to manage security across on-premise firewalls, networks, cloud, mobile, and IoT. Boost your security level across your entire Check Point environment with a dynamic security compliance solution that monitors your security infrastructure.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT Professionals and network adminstrators looking for a web application monitoring solution
|
Audience
Enterprises in need of a threat prevention and security management software solution to monitor cyber security processes
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationExtreme Networks
Founded: 1996
United States
www.extremenetworks.com/product/extremecontrol/
|
Company InformationCheck Point Software Technologies
Founded: 1993
United States
www.checkpoint.com/quantum/unified-cyber-security-platform/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
|
|||||
|
|
|
|||||
Categories |
Categories |
|||||
Network Access Control (NAC) Features
Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access
|
||||||
Integrations
Amazon Web Services (AWS)
Checkmk
Google Cloud Platform
Microsoft Azure
Mindflow
NetBeez
Okta
SecureW2
ServiceNow
Splunk Cloud Platform
|
Integrations
Amazon Web Services (AWS)
Checkmk
Google Cloud Platform
Microsoft Azure
Mindflow
NetBeez
Okta
SecureW2
ServiceNow
Splunk Cloud Platform
|
|||||
|
|
|