«Круг друзей»
Присоединяйтесь к «Kругу друзей» и экономьте! Узнайте больше
ТОП товар

HP IMC Endpoint Admission Defense

Код товара: 157252

3 910,00 / шт.
Получите на дом бесплатно*. Доставим 30 октября
* Стоимость доставки рассчитывается на базе платы за обслуживание и веса товара: 1.00 кг
Заберите бесплатно. Заказ будет выполнен предположительно 29 октября
Доставка в почтовый автомат 0,99–1,99 €. Предполагаемая доставка 30 октября
Информация о товаре

Свойства изделия

Тип продукта Серверное программное обеспечение
Бренд HP
Версия HPE IMC ES/HPE IMC SS
Максимальное количество пользователей 50
Поддерживаемое число процессоров 0
Дополнительная информация Нет
HP IMC Endpoint Admission Defense
Описание товара на английском:

HP Intelligent Management Center (IMC) software is a modular, comprehensive resource management platform. With its extensive device support, IMC software provides true end-to-end management for the entire network, as well as the open operation cycle.
IMC Endpoint Admission Defense (EAD) Software reduces network exposure by integrating security policy management and endpoint posture assessment to identify and isolate risks at the network edge. The security policy component allows administrators to control endpoint admission based on an endpoint's identity and posture. If an endpoint is not compliant with software, network assets can be protected by blocking or isolating an endpoint's access.
EAD reduces the risk of malicious code infections or other security breaches by detecting endpoint patches, viruses, Address Resolution Protocol attacks, abnormal traffic, the installation and running of sensitive software, as well as the status of system services. EAD provides continual monitoring of endpoints. The software now supports a concurrent licensing model.

Endpoint access control and management

Endpoint Admission Defense (EAD) Software supplies control and management of endpoint equipment; this module requires that a fully licensed version of the IMC User Access Management (UAM) Software module be installed; the number of licensed nodes for EAD software must match the number of UAM licensed nodes.

Enhancement of hierarchy management


The root node in the hierarchy architecture can set security policies for the entire network and distribute the policies to lower-level nodes; the lower-level nodes can send security and system status to the parent node, enabling the parent node to monitor lower-level nodes in real time; reports are also provided to administrators.

Anti-X software policy management

The Anti-X checking feature enables administrators to set an Anti-X checking rule for each security policy made in IMC, rather than having a single rule for all security policies.

COA support

EAD supports change of authorization attributes for a session. This feature offers a quarantine mode for devices, including other vendor devices.

Complete security evaluation

EAD reduces network vulnerabilities by determining endpoint compliance to defined policies; security checks can include anti-virus, anti-spyware, anti-phishing, firewall, required patches, and hard disk encryption software. EAD supports auto-remediation options with integration to patch management software like Microsoft Systems Management Server (SMS)/Windows Server Update Services (WSUS), and with antivirus software from Symantec, McAfee, and Trend Micro.

Endpoint identity

EAD software integrates with the UAM module to leverage existing user directories and groups to aid in the access and posture of policy creation; in addition to user name credentials, smart card and certificate authentication are also supported.
Integration of user management and topology management
On the topology map, user management operations are provided in the menus of the access devices or access terminals, this makes user management more flexible.

Desktop asset management (DAM)

EAD software supports desktop asset management features to provide a complete inventory of endpoints; hardware specifications can be auto-discovered, and software inventory can be completed to generate reports or run queries; in addition, administrators can set policies to aid in data theft prevention by controlling the computer peripherals, like USB storage; DAM also includes password and share controls and power management across endpoints.



  • Тип программатуры: Защита сетевых данных
  • Тип лицензии: Retail
Оттенок товара может отличаться от изображенного на фотографии. Описание продукта носит общий характер, и оно необязательно содержит все свойства продукта. Цены на товары, опубликованные в интернет-магазине, могут отличаться от цен на товары, применяемые в супермаркетах и сервисных центрах. Остатки товаров на складе и в интернет-магазине в исключительных случаях могут не совпадать, поэтому сохраняется вероятность того, что сроки доставки могут отличаться от указанных при размещении заказа и / или мы не сможем выполнить ваш заказ или выполним лишь частично (в таких случаях Покупатель будет немедленно проинформирован).

Заметили ошибку в описании товара, таблице свойств или фотогалерее? Сообщите нам