Identity Management.pdf

(2282 KB) Pobierz
Identity Management
Piotr Szołkowski
For Internal Use Only. Extreme Networks Confidential and Proprietary. Not to be distributed outside of Extreme Networks, Inc.
749001134.135.png
Compelling Portfolio
A portfolio to address the breadth of Ethernet
Ridgeline™
SummitStack™
Summit X480
EPICenter ®
Summit X650
BlackDiamond
20K
Summit X460
BlackDiamond
10K/12K
Management
Summit ® WM
Summit X450a
BlackDiamond ®
8900
8800
8500
Summit X250e
Summit X450e
Wireless
Sentriant ®
Summit X150
Summit X350
Security
ReachNXT™
10/100 Mb
1 Gigabit
10 Gigabit
40 Gigabit
10/100 Mb – 10 Gigabit – 40 Gigabit
Port Extender
ExtremeXOS ® Network Operating System
For Internal Use Only. Extreme Networks Confidential and Proprietary. Not to be distributed outside of Extreme Networks, Inc.
749001134.146.png 749001134.157.png 749001134.168.png 749001134.001.png 749001134.012.png 749001134.023.png 749001134.034.png 749001134.045.png 749001134.056.png 749001134.067.png 749001134.078.png 749001134.089.png 749001134.094.png 749001134.095.png 749001134.096.png 749001134.097.png 749001134.098.png 749001134.099.png 749001134.100.png 749001134.101.png 749001134.102.png 749001134.103.png 749001134.104.png 749001134.105.png 749001134.106.png 749001134.107.png 749001134.108.png 749001134.109.png 749001134.110.png 749001134.111.png 749001134.112.png 749001134.113.png 749001134.114.png 749001134.115.png 749001134.116.png 749001134.117.png 749001134.118.png 749001134.119.png 749001134.120.png 749001134.121.png 749001134.122.png 749001134.123.png 749001134.124.png 749001134.125.png 749001134.126.png 749001134.127.png 749001134.128.png 749001134.129.png 749001134.130.png 749001134.131.png 749001134.132.png 749001134.133.png 749001134.134.png 749001134.136.png 749001134.137.png 749001134.138.png
Introducing …
Network-based Identity and Access
Management
Extending security monitoring and provisioning of users to
the network for greater control
For Internal Use Only. Extreme Networks Confidential and Proprietary. Not to be distributed outside of Extreme Networks, Inc.
749001134.139.png 749001134.140.png 749001134.141.png 749001134.142.png 749001134.143.png 749001134.144.png 749001134.145.png 749001134.147.png 749001134.148.png 749001134.149.png
Traditional IdAM
Identity and Access Management (IdAM) provisioning at the
application (i.e. resource) level
Intellectual
property
data
IP Manager: John
Customer
data
Sales: Alice
Financial
resource
systems
Finance: Bob
User Community
Network Infrastructure
Protected Application / Data Center
Application / Data Center
For Internal Use Only. Extreme Networks Confidential and Proprietary. Not to be distributed outside of Extreme Networks, Inc.
Page 4
749001134.150.png 749001134.151.png 749001134.152.png 749001134.153.png 749001134.154.png 749001134.155.png 749001134.156.png 749001134.158.png 749001134.159.png 749001134.160.png 749001134.161.png 749001134.162.png 749001134.163.png 749001134.164.png 749001134.165.png 749001134.166.png 749001134.167.png 749001134.169.png 749001134.170.png 749001134.171.png 749001134.172.png 749001134.173.png 749001134.174.png 749001134.175.png 749001134.176.png 749001134.177.png 749001134.178.png 749001134.002.png 749001134.003.png 749001134.004.png 749001134.005.png 749001134.006.png 749001134.007.png 749001134.008.png 749001134.009.png 749001134.010.png 749001134.011.png 749001134.013.png 749001134.014.png 749001134.015.png 749001134.016.png 749001134.017.png 749001134.018.png 749001134.019.png 749001134.020.png 749001134.021.png 749001134.022.png
Network-based IdAM
Identity and Access Management (IdAM) provisioning at the
network and application level with Extreme Networks
Intellectual
property
data
IP Manager: John
Increased Network Availability
Eliminate “noise” traffic and malicious
activity within the infrastructure
Network and data access provisioned
based on roles and identity
Audit network activity per user
Customer
data
Sales: Alice
Financial
resource
systems
Finance: Bob
User Community
Protected Network Infrastructure
Network Infrastructure
Protected Application / Data Center
For Internal Use Only. Extreme Networks Confidential and Proprietary. Not to be distributed outside of Extreme Networks, Inc.
Page 5
749001134.024.png 749001134.025.png 749001134.026.png 749001134.027.png 749001134.028.png 749001134.029.png 749001134.030.png 749001134.031.png 749001134.032.png 749001134.033.png 749001134.035.png 749001134.036.png 749001134.037.png 749001134.038.png 749001134.039.png 749001134.040.png 749001134.041.png 749001134.042.png 749001134.043.png 749001134.044.png 749001134.046.png 749001134.047.png 749001134.048.png 749001134.049.png 749001134.050.png 749001134.051.png 749001134.052.png 749001134.053.png 749001134.054.png 749001134.055.png 749001134.057.png 749001134.058.png 749001134.059.png 749001134.060.png 749001134.061.png 749001134.062.png 749001134.063.png 749001134.064.png 749001134.065.png 749001134.066.png 749001134.068.png 749001134.069.png 749001134.070.png 749001134.071.png 749001134.072.png 749001134.073.png 749001134.074.png 749001134.075.png 749001134.076.png 749001134.077.png 749001134.079.png 749001134.080.png 749001134.081.png 749001134.082.png 749001134.083.png 749001134.084.png 749001134.085.png 749001134.086.png 749001134.087.png 749001134.088.png 749001134.090.png 749001134.091.png 749001134.092.png 749001134.093.png
Zgłoś jeśli naruszono regulamin