Preces apraksts angļu valodā:
HP Intelligent Management Center (IMC) software is a modular, comprehensive resource management platform. With its extensive device support, IMC software provides true end-to-end management for the entire network, as well as the open operation cycle.
IMC Endpoint Admission Defense (EAD) Software reduces network exposure by integrating security policy management and endpoint posture assessment to identify and isolate risks at the network edge. The security policy component allows administrators to control endpoint admission based on an endpoint's identity and posture. If an endpoint is not compliant with software, network assets can be protected by blocking or isolating an endpoint's access.
EAD reduces the risk of malicious code infections or other security breaches by detecting endpoint patches, viruses, Address Resolution Protocol attacks, abnormal traffic, the installation and running of sensitive software, as well as the status of system services. EAD provides continual monitoring of endpoints. The software now supports a concurrent licensing model.
Endpoint access control and management
Endpoint Admission Defense (EAD) Software supplies control and management of endpoint equipment; this module requires that a fully licensed version of the IMC User Access Management (UAM) Software module be installed; the number of licensed nodes for EAD software must match the number of UAM licensed nodes.
Enhancement of hierarchy management
The root node in the hierarchy architecture can set security policies for the entire network and distribute the policies to lower-level nodes; the lower-level nodes can send security and system status to the parent node, enabling the parent node to monitor lower-level nodes in real time; reports are also provided to administrators.
Anti-X software policy management
The Anti-X checking feature enables administrators to set an Anti-X checking rule for each security policy made in IMC, rather than having a single rule for all security policies.
EAD supports change of authorization attributes for a session. This feature offers a quarantine mode for devices, including other vendor devices.
Complete security evaluation
EAD reduces network vulnerabilities by determining endpoint compliance to defined policies; security checks can include anti-virus, anti-spyware, anti-phishing, firewall, required patches, and hard disk encryption software. EAD supports auto-remediation options with integration to patch management software like Microsoft Systems Management Server (SMS)/Windows Server Update Services (WSUS), and with antivirus software from Symantec, McAfee, and Trend Micro.
EAD software integrates with the UAM module to leverage existing user directories and groups to aid in the access and posture of policy creation; in addition to user name credentials, smart card and certificate authentication are also supported.
Integration of user management and topology management
On the topology map, user management operations are provided in the menus of the access devices or access terminals, this makes user management more flexible.
Desktop asset management (DAM)
EAD software supports desktop asset management features to provide a complete inventory of endpoints; hardware specifications can be auto-discovered, and software inventory can be completed to generate reports or run queries; in addition, administrators can set policies to aid in data theft prevention by controlling the computer peripherals, like USB storage; DAM also includes password and share controls and power management across endpoints.