Extreme Network Access Control

ExtremeControl lets you manage secure and automated access for both, BYOD and IoT devices from one convenient dashboard. It makes it easy to roll out granular policies across your wired and wireless networks to meet industry and company compliance obligations. Identity based network access control keeps unauthorized people and devices from accessing your network.

Our network access control solution is integrated with major enterprise platforms including solutions for network security, enterprise mobility management, analytics, federated directories, cloud, and datacenter. In addition, it offers an open northbound API for customized integrations to key enterprise platforms.

ExtremeControl is a stand-alone product that is part of our Extreme Management Center which gives you actionable insights, visibility and control in one single pane of glass. Moreover, ExtremeControl capabilities are further enhanced in convergence with Identity Engines.

Bluesky is extremely knowledgeable and experienced in the Access Control products and can help integrate into your environment.


  • Single pane of glass to configure and monitor end systems, profilers, security posture, guest access
  • Secure and automated network attachment of IoT devices and provide full visibility into what’s connected to your network
  • Threat mitigation and containment workflow based on alerts received from next generation security solutions
  • Out-of-the-box integration with third party security platform including MDM, posture, next generation firewall, SIEM, IDS/IPS and security gateway
  • Customized integration using an open northbound API into major enterprise IT platforms for an automated network infrastructure


  • Unifies the security of your wired and wireless networks with in-depth visibility and context-based control over users and endpoint devices for BYOD and IoT devices
  • Secure onboarding for BYOD or guest policies is made easy and auditable with our self-service portal that offers texting and social login based identity.
  • Granular policy controls enable you to comply to company policies and regulatory compliance obligations of your critical business operations.
  • Let’s you locate, authenticate and authorize targeted access policies to users and devices as they connect to the network for secure BYOD, guest access and IoT
  • Integration with IT infrastructure such as Active Directory, LDAP and firewall
  • Enhanced capabilities in convergence with Identity Engines
Read more

You would check if your door is locked when you leave home. Your employees should do the same for your servers, computers, mobile, phones, printers and webcams. And in case they tend to forget, we have ways to do it for them and gently help them remember.

Contact Us

Contact Us

  • Suite 806, 8/F, One Midtown,
    11 Hoi Shing Road,
    Tsuen Wan, NT, Hong Kong
  • +852 3468 3311
  • info@blueskysvc.com