Identity Engines Portfolio

More Secure Network Access for Employees’ Personal Devices

Say Yes to “Bring Your Own Device” While Maintaining Control of the Network

  • Help ensure secure network access for employees, guests, and partners, even when they are using personal devices at work. In supporting the Bring-Your-Own-Device (BYOD) trend, securing network access is paramount.
  • Define and enforce who gets on the network, with what, to go where. Avaya Identity Engines gives you granular control of both users and devices.
  • Set the policies you need. For example, a user who connects wirelessly to the corporate network via a work-provided laptop is granted full access. However, the same user connecting via a personal iPad device is granted restricted access.
  • Integrate other vendors’ equipment. Our solution integrates with any vendor's equipment, so you can add it to your network with confidence.

Cover All the Bases

Our extensive and detailed network access and health checking identity management software helps you ensure both corporate policies and regulatory security compliance standards are met.

Access Control Management Made Simple

An intuitive interface lets you set up and control network access. Think who, what devices, from where, when, and for which resources.

Welcome Your Guests

Quickly provision guest access to your network while maintaining security and providing an audit trail. Anyone can create a guest access account in just a few seconds

Customer Story
Pearland Independent School District

“We feel that all of our bases are extremely well-covered now with Avaya and we truly have a network foundation for the future.”

Read the Case Study ›

The Engine Behind Policy Management

The Ignition Server provides a central policy decision point that streamlines access management, improves security, provides reports, and lets network administrators apply policies.

Secure Network Access

More Secure Network Access for Guests

Our Ignition Guest Manager manages guest and visitor network access across wired and wireless access points. It lets you apply granular authorizations so guests can only access the network resources you choose.

Identity Management Software

Adding Devices to the Network

By intercepting traffic from employees and guests, our Ignition Access Portal simplifies how devices are authenticated and connected to the network. We provide tools to monitor, manage, and control access levels, and give detailed visibility into the profiles of individual devices.

Automated Configuration of Windows-Based Devices

Automated Configuration of Windows-Based Devices

Whether wired or wireless, no need to install configuration software on the device—our Ignition CASE Wizard (CASE stands for Client Access to the Secure Enterprise) automates and simplifies deploying 802.1x authentication and Microsoft NAP posture assessment throughout your network.

Identity Engine Portfolio

Practical Policy Options to Handle All Types of Users

Our Ignition Posture introduces various policy controls and enforces network provisioning options for each type of user functionality, rather than forcing all-or-nothing control. Run it on all major desktop OSs.

Automated Reporting Ignition Analytics

Automated Reporting Feeds Mandates for Compliance, Planning, and Security

Ignition Analytics is an indispensable reporting application that delivers in-depth analysis of network activity, including ingress and usage. Use it to monitor changes in the networking environment and thereby make informed decisions.

Assign Virtual LANs to IP Phones, Printers and More With Avaya Automated Processes

Avaya Automated Processes Save IT Resources and Prevent Errors

At the time of access, Avaya dynamically assigns a device to a Virtual LAN based on the user’s credentials, which eliminates the need to pre-assign switch ports. We automate the tasks that IT would otherwise perform manually. Assign Virtual LANs to IP phones, printers, IP cameras, medical devices, fax machines, or any IP-based device connecting to the network.


Fabric Networking Investment Pays off for Bullitt County Schools

Benefits: Network Scalability, Reduce Cost
Topics: Bring your Own Device (BYOD), Team Efficiency, eLearning, Smart Campus
Bullitt County Public Schools
Prepared for the Everywhere Perimeter? Here’s what IT Pros Say about Segmentation

Prepared for the Everywhere Perimeter? Here’s what IT Pros Say about Segmentation

Get the stats >
White Paper
Cybersecurity through Hyper-Segmentation: a Practical Foundation for Network-wide Security

Cybersecurity through Hyper-Segmentation: a Practical Foundation for Network-wide Security

Download now >
See Avaya’s approach to securing your network’s everywhere perimeter.

See Avaya’s approach to securing your network’s everywhere perimeter.

Watch now >

Connect With Avaya