Enterasys Drives Next-Generation Mobility, Wi-Fi and BYOD Innovation with IdentiFi
The explosive proliferation of WiFi-enabled mobile devices such as smart phones, tablets and notebooks and the increasing availability of mobile apps and services, both personal and corporate, have led to the phenomenon known as the Consumization of IT. Industry analysts predict 2 billion devices in use by 2015 with 75 percent of them used for both business and personal use. Already 75 percent of all trouble tickets are generated by mobile users. Given this ever-pressing demand for BYOD, IT has a pressing desire to understand BYOD deployment program requirements and costs.
Mobile users require high bandwidth network access and a consistent user experience wherever they are located within the enterprise, including complete accessibility to all applications that increasingly have real-time traffic and Quality of Service (QoS) requirements. While just about every networking device has a wireless interface, many of them still have a wired interface that users can access when working from their desk. This presents the IT staff with the challenge of creating a fully integrated, easily managed and secure access layer network that provides mobile, transparent and always-on wired-to-wireless edge services.
The Enterasys OneFabric Edge provides a unified application delivery architecture that extends the network fabric from the datacenter to the network edge. By creating one network environment, OneFabric Edge enables a consistent application experience while offering centralized visibility and control over the entire network. The addition of the recently announced IdentiFi Wi-Fi solution to the OneFabric Edge architecture adds a wired-like WLAN experience for mobile and BYOD users. IdentiFi can also be easily integrated with the Enterasys Mobile IAM solution to provide real-time analytics for integrated wired and wireless networks.
IdentiFi includes access points, centralized management, and controllers that provide the scalability, control, and density required to meet the high user demand for simultaneous voice, HD video, and data services. With IdentiFi, control and management are done centrally then pushed out to access points thereby distributing the intelligence out to the edge for simplicity, optimization and security.
IdentiFi Features
Density and Scalability - Access points(APs) utilize RF management techniques between neighboring APs to distribute the client device load across multiple APs, as well as across multiple channels within each AP. They are designed to support up to 200 video clients per AP.
No Hidden Costs or Licenses - This allows the network to grow and expand in a predictable manner.
Security - Includes strong encryption to protect data, authentication to validate users, policy to define user actions, Wireless Intrusion Protection/Detection Systems (WIPS/WIDS) to reduce exposure and comprehensive data collection for forensics. Once a policy is defined, it will operate seamlessly across both the Wi-Fi and wired network providing consistent security enforcement. In addition, IdentiFi analytics provides statistical data to meet compliance requirements, generate various reports, track users/devices and gather forensic information in the event of a breach.
Operational Flexibility - With distributed intelligence control and management are maintained centrally and are implemented and enforced throughout the entire network. Controllers can be hardware-based or as a virtualized solution that can be installed on an existing server and deployed in the datacenter or in the cloud.
Radar RF Management, Analysis and Control - All IdentiFi 3700 series of access points support WIPS/WIDS from the start. Dynamic Radio Management (DRM) operates independently on each radio automatically adjusting radio power output and channel selection to accommodate changing RF environments to maintain a quality user experience.
High Availability - Both virtual and physical controllers have resiliency built in from the start; there is no additional software to add or purchase. Controllers run as active-active pairs. Additionally, if there is a WAN failure between the IdentiFi APs and the controllers, the APs will continue running without interruption to existing or new client connections. In the unlikely event of an AP failure, neighboring APs will automatically pick up the connections from the failed access point while maintaining user connectivity.
Apple Bonjour and Multicast Containment - The following features allow IT to take control of multicast traffic on the network in order to maximize network performance while providing a consistent experience for clients.
-
Multicast to unicast translation at the AP occurs as the AP receives multicast data and converts it to multiple unicast streams sent to each client at the speeds they are connected at.
-
Policy-based multicast filtering at the AP allows the administrators to block or filter multicast traffic at the access edge without requiring the controller to make decisions saving bandwidth resources.
-
Classification and containment of multicast traffic to a separate, multicast only VLAN ensures that Bonjour services are contained within physical or logical domains via integration with Enterasys S and K Series and Mobile IAM.
Qualities of Experience (QoE) - Hardware-based QoS queues and per client queuing are utilized to provide toll-quality voice and real-time HD video support for today's bandwidth intensive, latency-sensitive business applications. In addition, IdentiFi is certified with leading voice over wireless handset vendors, such as Ascom, Polycom, Vocera, and Siemens.
Integration with Mobile IAM
Enterasys Mobile IAM addresses IT challenges being driven by today's enterprise and campus mobility imperatives providing end-to-end visibility and control over individual users, devices and applications, in multi-vendor infrastructures. It provides complete software supporting seven core capabilities: auto-discovery, multi-level device profiling, flexible onboarding, context-based policy management, guest access, virtual desktop infrastructure (VDI) and mobile device management integration (MDM).
Policy management is highly granular including per port, per device layer 2-4 access control, QoS/priority, rate limit/shape and more. Real time tracking and unique state change notification for over 50 attributes per device and user give IT maximum visibility into all network activity. It offers an open architecture for assessment (MDM integration) and threat response (Next Generation Firewall (NGFW), Security Information and Event Management (SIEM), Intrusion Prevention System (IPS). Mobile IAM can scale up to 100,000 devices, depending on the configuration, for the flexibility to meet current and future needs without having to buy components that are excessive at the start. The Mobile IAM Appliance is available as a physical or virtual appliance to best meet your deployment needs.
What This Means to You
To Customers: OneFabric Edge's wired and wireless controllers, access points and management console deliver a fully integrated, unified edge solution allowing IT departments to have both deep visibility as well as a holistic view of their entire network. If you can tell who the user is, what device they are using, where they are connected and which apps are being used, you have the opportunity to manage and control the user experience. A critical factor in achieving this is the ability to create unified policies that allow the network to deterministically understand the access request and provision the connection correctly.
Other solutions exist, of course. For example, check out those of Aruba, Cisco and Juniper. Be sure to compare solutions on the above mentioned criteria as well as:
-
Total cost of ownership in terms of both CapEx and OpEx
-
Multi-vendor integration across both wired and wireless domains
-
Availability of dynamic infrastructure management for virtualization
-
Availability of flexible and meaningful control of resources through context based policy management.
To Partners: IdentiFi offers partners additional opportunity to participate in the BYOD-driven market with a competitively packaged and featured solution offering IT control and visibility into their BYOD environments. This consultative sale, which offers improved business agility and employee satisfaction, should prove easier than selling switches and infrastructure, because of its emphasis on revenue growth - a line of business imperative. In addition, all the services that are required - the integration and deployment services - are available to partners to either supply or to sell through Enterasys Pro Services.
Tags
Start YourCustomized Search
SOLUTION AREA
SOLUTION PROVIDERS
- 8x8 (40) Apply 8x8 filter
- Alcatel-Lucent Enterprise (50) Apply Alcatel-Lucent Enterprise filter
- AT&T (44) Apply AT&T filter
- AudioCodes (49) Apply AudioCodes filter
- Avaya (397) Apply Avaya filter
- Cisco (574) Apply Cisco filter
- Dell (11) Apply Dell filter
- Five9 (54) Apply Five9 filter
- Fuze (39) Apply Fuze filter
- Genesys (100) Apply Genesys filter
- HP (98) Apply HP filter
- IBM (171) Apply IBM filter
- Jabra (9) Apply Jabra filter
- Logitech (56) Apply Logitech filter
- Lumen (4) Apply Lumen filter
- Masergy (50) Apply Masergy filter
- Microsoft (766) Apply Microsoft filter
- Mitel (233) Apply Mitel filter
- NEC (128) Apply NEC filter
- Nectar (58) Apply Nectar filter
- Polycom (95) Apply Polycom filter
- Ramp (37) Apply Ramp filter
- RingCentral (126) Apply RingCentral filter
- Sennheiser (18) Apply Sennheiser filter
- Slack (13) Apply Slack filter
- Tata Communications (59) Apply Tata Communications filter
- Unify (186) Apply Unify filter
- Vonage Business (80) Apply Vonage Business filter
- Yealink (8) Apply Yealink filter
- Zoho (6) Apply Zoho filter
- Zoom (21) Apply Zoom filter
- Acme Packet (24) Apply Acme Packet filter
- Allworx (2) Apply Allworx filter
- Arkadin (22) Apply Arkadin filter
- Aspect (34) Apply Aspect filter
- BT (25) Apply BT filter
- CaféX (8) Apply CaféX filter
- CallTower (14) Apply CallTower filter
- Clarity Connect (10) Apply Clarity Connect filter
- Continuant (1) Apply Continuant filter
- Damaka (4) Apply Damaka filter
- Dialogic (5) Apply Dialogic filter
- Dimension Data (44) Apply Dimension Data filter
- Empirix (11) Apply Empirix filter
- Enghouse Interactive (17) Apply Enghouse Interactive filter
- Inference Solutions (9) Apply Inference Solutions filter
- IntelePeer (27) Apply IntelePeer filter
- IR (11) Apply IR filter
- Jive (21) Apply Jive filter
- Kurmi Software (21) Apply Kurmi Software filter
- Lifesize (33) Apply Lifesize filter
- Lightware (3) Apply Lightware filter
- Mavenir (6) Apply Mavenir filter
- Modality Systems (8) Apply Modality Systems filter
- Momentum (36) Apply Momentum filter
- Netfortris (5) Apply Netfortris filter
- NetSapiens (6) Apply NetSapiens filter
- NewVoiceMedia (31) Apply NewVoiceMedia filter
- Nureva (26) Apply Nureva filter
- NUWAVE (5) Apply NUWAVE filter
- Orange (32) Apply Orange filter
- OVCC (8) Apply OVCC filter
- Panasonic (18) Apply Panasonic filter
- PanTerra Networks (9) Apply PanTerra Networks filter
- ScanSource (21) Apply ScanSource filter
- SIPPIO (3) Apply SIPPIO filter
- Snom (20) Apply Snom filter
- Star2Star (8) Apply Star2Star filter
- StarLeaf (12) Apply StarLeaf filter
- Tadiran Telecom (2) Apply Tadiran Telecom filter
- TekVizion (9) Apply TekVizion filter
- Unimax (7) Apply Unimax filter
- Verint (42) Apply Verint filter
- Voice4Net (2) Apply Voice4Net filter
- VOSS (85) Apply VOSS filter
- Voxbone (14) Apply Voxbone filter
- West (28) Apply West filter
- XO Communications (3) Apply XO Communications filter
- Yorktel (17) Apply Yorktel filter
- Zultys (2) Apply Zultys filter
- 3CX (8) Apply 3CX filter
- ADDASOUND (1) Apply ADDASOUND filter
- Aerohive (1) Apply Aerohive filter
- Aryaka (1) Apply Aryaka filter
- Asurion (22) Apply Asurion filter
- Avnet (7) Apply Avnet filter
- Bandwidth (5) Apply Bandwidth filter
- Calabrio (5) Apply Calabrio filter
- Consilium Software (13) Apply Consilium Software filter
- Drum (5) Apply Drum filter
- ESI (6) Apply ESI filter
- Esna (16) Apply Esna filter
- Exinda (2) Apply Exinda filter
- EZuce (3) Apply EZuce filter
- GUnify (6) Apply GUnify filter
- Highfive (4) Apply Highfive filter
- Huawei (47) Apply Huawei filter
- Imagicle (3) Apply Imagicle filter
- IPCortex (1) Apply IPCortex filter
- KnoahSoft (1) Apply KnoahSoft filter
- KOVA (1) Apply KOVA filter
- Logmein (9) Apply Logmein filter
- Metropolis Technologies (4) Apply Metropolis Technologies filter
- Mutare (2) Apply Mutare filter
- NextPlane (27) Apply NextPlane filter
- Ooma (16) Apply Ooma filter
- Patton (11) Apply Patton filter
- Radish Systems (1) Apply Radish Systems filter
- Radisys (3) Apply Radisys filter
- Shango (1) Apply Shango filter
- SMART (163) Apply SMART filter
- Stack8 (1) Apply Stack8 filter
- Swyx (1) Apply Swyx filter
- TrueConf (4) Apply TrueConf filter
- UJET (13) Apply UJET filter
- Voximplant (3) Apply Voximplant filter
CONTENT TYPE
- BC Expert Insights Market (43) Apply BC Expert Insights Market filter
- BC Expert Insights Objective - Vendor Neutral (42) Apply BC Expert Insights Objective - Vendor Neutral filter
- BC Expert Insights Planning (15) Apply BC Expert Insights Planning filter
- BC Expert Insights Solution (12) Apply BC Expert Insights Solution filter
- BC Expert Insights Vendor (80) Apply BC Expert Insights Vendor filter
- BC Expert Insights Vendor Solution (147) Apply BC Expert Insights Vendor Solution filter
- BC Expert Roundtable (135) Apply BC Expert Roundtable filter
- Bcs Webinar (0)
- Bcs Webinar Registration (0)
- Best Practice (38) Apply Best Practice filter
- Buyer Guide (14) Apply Buyer Guide filter
- Case Study (29) Apply Case Study filter
- Executive Interview (145) Apply Executive Interview filter
- Expert Roundtable (452) Apply Expert Roundtable filter
- Guest Contributions (35) Apply Guest Contributions filter
- Multimedia (38) Apply Multimedia filter
- News Analysis (2081) Apply News Analysis filter
- Newsfeed Article (1303) Apply Newsfeed Article filter
- Newsfeed Article (1) Apply Newsfeed Article filter
- Thought Leadership (21) Apply Thought Leadership filter
- Vendor Collateral (211) Apply Vendor Collateral filter
- Vendor Resource Best Practices (24) Apply Vendor Resource Best Practices filter
- Vendor Resource Buyers Guides (2) Apply Vendor Resource Buyers Guides filter
- Vendor Resource Multimedia Content (4) Apply Vendor Resource Multimedia Content filter
- Vendor Resource White Paper (4) Apply Vendor Resource White Paper filter
- Webinar (13) Apply Webinar filter
- Webinars (7) Apply Webinars filter
- White Paper (64) Apply White Paper filter
MORE FILTERS
INDUSTRY
- Banking And Investment (800) Apply Banking And Investment filter
- Education (446) Apply Education filter
- Energy And Utilities (487) Apply Energy And Utilities filter
- Finance (12) Apply Finance filter
- Government (675) Apply Government filter
- Healthcare (482) Apply Healthcare filter
- Hospitality (180) Apply Hospitality filter
- Insurance (100) Apply Insurance filter
- Manufacturing (704) Apply Manufacturing filter
- Media/Publishing (422) Apply Media/Publishing filter
- None (43) Apply None filter
- Professional Services (745) Apply Professional Services filter
- Retail & Distribution (798) Apply Retail & Distribution filter
- Technology (1611) Apply Technology filter
- Transportation (110) Apply Transportation filter
Comments
There are currently no comments on this article.
You must be a registered user to make comments