Visas kategorijas
401150

Saņem 17.04.

Ielikt grozā Daudzums:

Piegādes veidi:

PICKUP Saņem piegādes punktos
17.04.2020
ADDRESS Saņem piegādi uz adresi
17.04.2020

Preces galvenie parametri:

  • Programmatūras tips: Tīkla datu aizsardzība
  • Licences tips: Retail
  • Versija: HPE IMC ES/HPE IMC SS
Vairāk par šo preci
DĀVANA:

Bezmaksas piegāde uz "K-Senukai"!

Līzinga kalkulators:

Ikmēneša maksājums : 142.84
Pasūtījumiem, kuru summa pārsniedz 1400 EUR, ir obligāta pirmā iemaksa vismaz 10% apmērā no pirkuma summas.

Detalizēta informācija

Ražotājs HP
Programmatūras tips Tīkla datu aizsardzība
Licences tips Retail
Versija HPE IMC ES/HPE IMC SS
Maksimālais fizisku procesoru atbalsts 0
Maksimālais loģisko procesoru atbalsts 0
Operatīvās atmiņas apjoma atbalsts (TB) 0
Maksimālais lietotāju skaits 50
Minimālās sistēmas prasības Nav
Īpašas atzīmes Atbalsta RAID 0, 1, 1+0, 5.

Preces apraksts

HP IMC Endpoint Admission Defense
Preces apraksts angļu valodā:

HP Intelligent Management Center (IMC) software is a modular, comprehensive resource management platform. With its extensive device support, IMC software provides true end-to-end management for the entire network, as well as the open operation cycle.
IMC Endpoint Admission Defense (EAD) Software reduces network exposure by integrating security policy management and endpoint posture assessment to identify and isolate risks at the network edge. The security policy component allows administrators to control endpoint admission based on an endpoint's identity and posture. If an endpoint is not compliant with software, network assets can be protected by blocking or isolating an endpoint's access.
EAD reduces the risk of malicious code infections or other security breaches by detecting endpoint patches, viruses, Address Resolution Protocol attacks, abnormal traffic, the installation and running of sensitive software, as well as the status of system services. EAD provides continual monitoring of endpoints. The software now supports a concurrent licensing model.

Endpoint access control and management

Endpoint Admission Defense (EAD) Software supplies control and management of endpoint equipment; this module requires that a fully licensed version of the IMC User Access Management (UAM) Software module be installed; the number of licensed nodes for EAD software must match the number of UAM licensed nodes.

Enhancement of hierarchy management


The root node in the hierarchy architecture can set security policies for the entire network and distribute the policies to lower-level nodes; the lower-level nodes can send security and system status to the parent node, enabling the parent node to monitor lower-level nodes in real time; reports are also provided to administrators.

Anti-X software policy management

The Anti-X checking feature enables administrators to set an Anti-X checking rule for each security policy made in IMC, rather than having a single rule for all security policies.

COA support

EAD supports change of authorization attributes for a session. This feature offers a quarantine mode for devices, including other vendor devices.

Complete security evaluation

EAD reduces network vulnerabilities by determining endpoint compliance to defined policies; security checks can include anti-virus, anti-spyware, anti-phishing, firewall, required patches, and hard disk encryption software. EAD supports auto-remediation options with integration to patch management software like Microsoft Systems Management Server (SMS)/Windows Server Update Services (WSUS), and with antivirus software from Symantec, McAfee, and Trend Micro.

Endpoint identity

EAD software integrates with the UAM module to leverage existing user directories and groups to aid in the access and posture of policy creation; in addition to user name credentials, smart card and certificate authentication are also supported.
Integration of user management and topology management
On the topology map, user management operations are provided in the menus of the access devices or access terminals, this makes user management more flexible.

Desktop asset management (DAM)

EAD software supports desktop asset management features to provide a complete inventory of endpoints; hardware specifications can be auto-discovered, and software inventory can be completed to generate reports or run queries; in addition, administrators can set policies to aid in data theft prevention by controlling the computer peripherals, like USB storage; DAM also includes password and share controls and power management across endpoints.

Atsauksmes

0.0 no 5 zvaigznēm (Kopā 0 vērtējumi)

5★
4★
3★
2★
1★
HP HP IMC Endpoint Admission Defense HP IMC Endpoint Admission Defense
Preces apraksts angļu valodā:

HP Intelligent Management Center (IMC) software is a modular, comprehensive resource management platform. With its extensive device support, IMC software provides true end-to-end management for the entire network, as well as the open operation cycle.
IMC Endpoint Admission Defense (EAD) Software reduces network exposure by integrating security policy management and endpoint posture assessment to identify and isolate risks at the network edge. The security policy component allows administrators to control endpoint admission based on an endpoint's identity and posture. If an endpoint is not compliant with software, network assets can be protected by blocking or isolating an endpoint's access.
EAD reduces the risk of malicious code infections or other security breaches by detecting endpoint patches, viruses, Address Resolution Protocol attacks, abnormal traffic, the installation and running of sensitive software, as well as the status of system services. EAD provides continual monitoring of endpoints. The software now supports a concurrent licensing model.

Endpoint access control and management

Endpoint Admission Defense (EAD) Software supplies control and management of endpoint equipment; this module requires that a fully licensed version of the IMC User Access Management (UAM) Software module be installed; the number of licensed nodes for EAD software must match the number of UAM licensed nodes.

Enhancement of hierarchy management


The root node in the hierarchy architecture can set security policies for the entire network and distribute the policies to lower-level nodes; the lower-level nodes can send security and system status to the parent node, enabling the parent node to monitor lower-level nodes in real time; reports are also provided to administrators.

Anti-X software policy management

The Anti-X checking feature enables administrators to set an Anti-X checking rule for each security policy made in IMC, rather than having a single rule for all security policies.

COA support

EAD supports change of authorization attributes for a session. This feature offers a quarantine mode for devices, including other vendor devices.

Complete security evaluation

EAD reduces network vulnerabilities by determining endpoint compliance to defined policies; security checks can include anti-virus, anti-spyware, anti-phishing, firewall, required patches, and hard disk encryption software. EAD supports auto-remediation options with integration to patch management software like Microsoft Systems Management Server (SMS)/Windows Server Update Services (WSUS), and with antivirus software from Symantec, McAfee, and Trend Micro.

Endpoint identity

EAD software integrates with the UAM module to leverage existing user directories and groups to aid in the access and posture of policy creation; in addition to user name credentials, smart card and certificate authentication are also supported.
Integration of user management and topology management
On the topology map, user management operations are provided in the menus of the access devices or access terminals, this makes user management more flexible.

Desktop asset management (DAM)

EAD software supports desktop asset management features to provide a complete inventory of endpoints; hardware specifications can be auto-discovered, and software inventory can be completed to generate reports or run queries; in addition, administrators can set policies to aid in data theft prevention by controlling the computer peripherals, like USB storage; DAM also includes password and share controls and power management across endpoints.

JG754AAE 4011.50
Uzdot jautājumu

captcha
Uz augšu