Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated ExtremeControl Alternatives

ExtremeControl Reviews & Product Details

ExtremeControl Overview

What is ExtremeControl?

ExtremeControl is a Granular Policy Control from the Edge to the Datacenter into the Multicloud

ExtremeControl Details
Show LessShow More
Product Description

ExtremeControl is a Granular Policy Control from the Edge to the Datacenter into the Multicloud


Seller Details
Year Founded
1996
HQ Location
Morrisville, US
Twitter
@ExtremeNetworks
30,022 Twitter followers
LinkedIn® Page
www.linkedin.com
3,883 employees on LinkedIn®
Ownership
NASDAQ: EXTR

Recent ExtremeControl Reviews

Verified User
U
Verified UserMid-Market (51-1000 emp.)
4.5 out of 5
"One of the best NAC solution available in market"
Granularity and visibility of devices is in depth & it also helps enable onboarding of IoT devices
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

ExtremeControl Media

Answer a few questions to help the ExtremeControl community
Have you used ExtremeControl before?
Yes

1 ExtremeControl Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 ExtremeControl Reviews
4.5 out of 5
1 ExtremeControl Reviews
4.5 out of 5
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
UI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ExtremeControl?

Granularity and visibility of devices is in depth & it also helps enable onboarding of IoT devices Review collected by and hosted on G2.com.

What do you dislike about ExtremeControl?

It's a good good solution & I have not came across any setbacks yet. Review collected by and hosted on G2.com.

What problems is ExtremeControl solving and how is that benefiting you?

Onboarding of Guest & user with secured policy Review collected by and hosted on G2.com.

There are not enough reviews of ExtremeControl for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(205)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
2
NordLayer Logo
NordLayer
4.3
(117)
A stress-free way to secure your network.
3
Genea Security Logo
Genea Security
4.3
(85)
Genea Security's cloud-based access control system is designed for the convenience and security of both tenants and building management teams.
4
Citrix Gateway Logo
Citrix Gateway
4.0
(71)
Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform.
5
Portnox Logo
Portnox
4.4
(71)
Portnox is a solution for on-premise network access control, visibility and enforcement in real-time on all devices.
6
SecureW2 JoinNow Logo
SecureW2 JoinNow
4.7
(68)
The full JoinNow Suite contains everything you need to transition to secure passwordless authentication. It includes an intuitive managed PKI for certificate creation and management, as well as best-in-class certificate delivery solutions such as a dissolvable self-service configuration client for unmanaged devices and automatic enrollment gateways for managed devices. The platform also offers a Cloud RADIUS server, designed from the ground up for passwordless security and works seamlessly with Cloud Identity Providers.
7
McAfee NAC Logo
McAfee NAC
4.3
(67)
McAfee's network security offerings help you block malware and advanced targeted attacks on your network. Unlike traditional network security solutions, McAfee extends protection beyond IPS signature matching with layered signature-less technologies that defend against never-before-seen threats.
8
Twingate Logo
Twingate
4.7
(67)
Twingate secures remote access to private apps, data and environments, allowing businesses to replace corporate VPNs with a more secure, usable, performant and modern zero trust-based solution.
9
Google Cloud Identity-Aware Proxy Logo
Google Cloud Identity-Aware Proxy
4.4
(56)
Cloud Identity-Aware Proxy (Cloud IAP) controls access to user cloud applications running on Google Cloud Platform.
10
Cisco Identity Services Engine (ISE) Logo
Cisco Identity Services Engine (ISE)
4.5
(48)
Gain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management.
Show More