The HP IMC Endpoint Admission Defense (EAD) Software reduces network exposure by integrating security policy management and endpoint posture assessment to identify and isolate risks within the network.

IMC EAD Software reduces the risk of malicious code infections and other security breaches by detecting breaches like viruses, abnormal traffic, or the running of sensitive software. Additionally the software can also protect sensitive data through control of computer peripherals.

What's New

  • Automatically blocks suspicious incoming traffic.
  • Protects sensitive data through control of computer peripherals.
  • Reduces infection risk of network terminal.
  • Integrated security policy management and endpoint posture assessment.
  • Reporting capability for greater inventory and accounting control.

Features

Security Control with Integration of User Management and Device Manageme

  • The HP IMC Endpoint Admission Defense (EAD) Software assists network administrators in managing security policies and reducing network breaches.
  • Gives the administrator the ability to set security policies based upon shared data to create logical workgroups for information sharing and collaboration.
  • Network administrators can use IMC EAD Software to create richer, more informative reports on network devices.
  • IMC EAD Software integrates with leading enterprise mobility management vendors for mobile endpoint management and compliance.

Complete Security Evaluation Efficiently Reduces Network Vulnerabilities

  • The HP IMC Endpoint Admission Defense (EAD) Software reduces network vulnerabilities by determining endpoint compliance to defined policies.
  • Provides end-to-end virtualization capabilities across all nodes and can send security policies throughout the system.
  • Network administrators can leverage integration to patch management software like Microsoft Systems Management Server as well as tools from Symantec, McAfee, and Trend Micro.

Greater Network Device Awareness with Built-in Desktop Asset Management

  • The HP IMC (IMC) Endpoint Admission Defense (EAD) Software provides a complete inventory of endpoints to understand what exists on the network.
  • The IMC EAD Software gives network administrators the power to control computer peripherals to prevent crimes like data theft.
  • Network administrators have more control of software inventory to generate reports or run queries.

QuickSpecs

What's new

IMC Endpoint Admission Defense v7 includes concurrent licensing, improved endpoint identification, real-time monitoring of endpoints

  • Concurrent user licensing model accommodate a fluid employee presence at the workplace.
  • Real-time monitoring for isolated endpoints.
  • Informing endpoint users of disabled peripheral devices.

Featured Videos

HP Complete Unified BYOD solution

Brochures

Download the module

Important note

You must have the Enterprise or Standard version of IMC installed prior to installing the EAD module.

YES, I have Enterprise or Standard installed.

Get the Module

NO, I don't I have Enterprise or Standard installed.

Get a Platform
 

HP Complete Unified BYOD

HP IMC Endpoint Admission Defense Software

Management

  • Endpoint access and control
    • the system — supplies control and management of endpoint equipment; this module requires that a fully licensed version of the IMC User Access Management (UAM) Software module be installed.
    • EAD integrates — With MobileIron and Citrix® to certify that the device is compliant with MDM policies before receiving access to the network
  • Enhancement of hierarchy management — sets security policies for the entire network and distribute the policies to lower-level nodes; the lower-level nodes can send security and system status to the parent node, enabling the parent node to monitor lower-level nodes in real time; reports are also provided to administrators
  • Anti-X software policy management — enables administrators to set an Anti-X checking rule for each security policy made in IMC, rather than having a single rule for all security policies
  • IPv6 communication with endpoints — is supported by EAD policy server and Desktop Asset Management (DAM) server.
  • Change of authorization support — contains change-of-authorization attributes for a session; this feature offers a quarantine mode for devices, including other vendor devices
  • eAPI for DAM — is found inside IMC Extended API and assists in database activity monitoring.

Security

  • Complete security evaluation — reduces network vulnerabilities by determining endpoint compliance to defined policies; security checks can include antivirus, anti-spyware, anti-phishing, firewall, required patches, and hard disk encryption software; EAD supports auto-remediation options with integration to patch management software like Microsoft® Systems Management Server (SMS)/Windows® Server Update Services (WSUS), and with antivirus software from Symantec, McAfee, and Trend Micro
  • Endpoint identity — integrates with the UAM module to leverage existing user directories and groups to aid in the access and posture of policy creation; in addition to user name credentials, smart card and certificate authentication are supported
  • Integration of user management and device management
    • Report correlation — uses the IMC module design, data across modules can be shared to create richer, more informative reports (e.g., network devices can display end-user statistics)
    • Policy correlation — lets administrators can set policy based on shared data (e.g., policies or actions can be location-specific)
    • Module correlation — displays user-specific traffic analysis
  • Integration of user management and topology management — improves upon user management operations, which are provided in the menus of the access devices or access terminals (e.g., view user information, disconnect online users, and perform security checks); this makes user management more flexible
  • Desktop asset management
    • supported asset management features — allows for hardware specifications to be be auto-discovered (e.g., CPU, memory), and software inventory can be completed to generate reports or run queries
    • policy setting — aids in preventing data theft by controlling the computer peripherals, like USB storage; DAM also includes password and share controls and power management across endpoints
  • MDM Collaboration — supports API integration with MobileIron and Citrix to certify that the device is compliance with MDM Policies before getting access to the network

Warranty and support

HP IMC Endpoint Admission Defense Software Module 50-user E-LTU (JG754AAE)
Minimum system requirements Server:
Intel® Pentium® 4 3.0 GHz
4 GB RAM memory
50 GB storage
10/100 MB NIC
System requirements, recommended Server:
3.0 GHz Intel® Xeon® or Intel® Core™2 Duo processor or equivalent
4 GB RAM memory
100 GB storage
1000 MB NIC
Software (required) Server:
Operating system: Windows Server 2008 with Service Pack 2
Windows Server 2008 X64 with Service Pack 2
Windows Server 2008 R2 with Service Pack 1
Windows Server 2012 with KB2836988
Windows Server 2012 R2
Red Hat Enterprise Linux 5 (Enterprise and Standard versions only)
Red Hat Enterprise Linux 5 X64 (Enterprise and Standard versions only)
Red Hat Enterprise Linux 5.5 (Enterprise and Standard versions only)
Red Hat Enterprise Linux 5.5 X64 (Enterprise and Standard versions only)
Red Hat Enterprise Linux 5.9 (Enterprise and Standard versions only)
Red Hat Enterprise Linux 5.9 X64 (Enterprise and Standard versions only)
Red Hat Enterprise Linux 6.1 X64 (Enterprise and Standard versions only)
Red Hat Enterprise Linux 6.4 X64 (Enterprise and Standard versions only)
Database:
Microsoft SQL Server 2008 Service Pack 3 (Windows only)
Microsoft SQL Server 2008 R2 Service Pack 2 (Windows only)
Microsoft SQL Server 2012 Service Pack 2 (Windows only)
Microsoft SQL Server 2014 (Windows only)
Oracle 11g Release 1 (Linux only)
Oracle 11g Release 2 (Linux only)
MySQL Enterprise Server 5.1 (Linux and Windows) (Up to 1000 devices are supported)
MySQL Enterprise Server 5.5 (Linux and Windows) (Up to 1000 devices are supported)
MySQL Enterprise Server 5.6 (Linux and Windows) (Up to 1000 devices are supported)
Recommended software Server:
Windows® Server 2003 with Service Pack 2
Windows® Server 2003 X64 with Service Pack 2 and KB942288
Windows® Server 2003 R2 with Service Pack 2
Windows® Server 2003 R2 X64 with Service Pack 2 with KB942288
Windows® Server 2008 with Service Pack 2
Windows® Server 2008 X64 with Service Pack 2
Windows® Server 2008 R2 with Service Pack 1
Windows® Server 2008 R2 X64 with Service Pack 1
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 5 X64
Red Hat Enterprise Linux 5.5
Red Hat Enterprise Linux 5.5 X64
Red Hat Enterprise Linux 6.1 X64
Browser supported Firefox 3.6 or later is recommended
Internet Explorer 8.0 or later is recommended
Hypervisor VMware Workstation 6.5.x
VMware Workstation 9.0.x
VMware ESX Server 4.x
VMware ESX Server 5.x
Windows Server 2008 R2 Hyper-V
Windows Server 2012 Hyper-V
Physical characteristics
What's included
What's in the box License Entitlement, Electronic Delivery
Warranty Not applicable;Electronic and telephone support: limited electronic and telephone support is available from HP refer to www.hp.com/networking/support for details on the support provided and the period during which support is available

HP IMC Endpoint Admission Defense Additional 50-user E-LTU (JG755AAE)

Additional 50-user E-LTU for HP IMC Endpoint Admission Defense


This accessory currently doesn't have any detailed specifications. To learn more contact a HP Networking Expert.

Compatible products

HP IMC Endpoint Admission Defense Software

HP IMC Endpoint Admission Defense Software

HP Care Packs for HP Networking

HP IMC Endpoint Admission Defense Software Module 50-user E-LTU
  • 3-Year, 9x5 SW phone support, software updates (UV746E)
  • 3-year, 24x7 SW phone support, software updates (UV747E)

HP Networking Services

Services that add value to your business

The warranties on HP Networking products provide a robust foundation for ongoing network support, but many customers have advanced support needs. Today's enterprise businesses, regardless of their size, are under increasing pressure to reduce the cost and complexity of supporting their network infrastructures. Demand for new services from businesses and their end users is constantly increasing. HP offers an affordable, comprehensive portfolio of networking services for organizations of all sizes. HP has a unique services advantage you can benefit from, and HP is the only vendor in the IT industry that can provide integrated and consistent support for your entire technology infrastructure worldwide, including networking, servers and storage, and imaging and printing, as well as desktop and mobile computing, to help you grow your business with expert support that is affordable, personal, and scaled to your needs. HP Networking's implementation and design centers simplify your network planning, while HP Technology and Enterprise Services deliver choice and flexibility.

HP provides a full range of custom services to meet the end-to-end networking needs of our customers. HP Network Lifecycle Services form the core foundation of network consulting, assessments, planning, design, integration, deployment, and management. They are available as standalone services or can be crafted to deliver solutions across the services portfolio, spanning network performance, network security and risk management, global deployment, data center networking, wireless LAN/mobility, and Unified Communications and Collaboration.

Additional Support and Services

To get more details about the HP Services available in your country, please visit Networking Services

Resources

Loading Collateral...

No content available
Brochures  (0) Type Size Date
Case studies  (0) Type Size Date
Datasheets / QuickSpecs  (0) Type Size Date
Fact sheets  (0) Type Size Date
Images  (0) Type Size Date
Newsletters  (0) Type Size Date
Posters  (0) Type Size Date
Reference guides  (0) Type Size Date
Related links  (0) Type Size Date
Reports  (0) Type Size Date
Solution briefs  (0) Type Size Date
TrendWatches  (0) Type Size Date
Videos  (0) Type Size Date
Webinars  (0) Type Size Date
White papers  (0) Type Size Date
Application notes  (0) Type Size Date
Configuration guides  (0) Type Size Date
Demo how to guides  (0) Type Size Date
Design guides  (0) Type Size Date
Feature matrixes  (0) Type Size Date
Installation guides  (0) Type Size Date
Manuals  (0) Type Size Date
PoC test plans  (0) Type Size Date
Reference architectures  (0) Type Size Date
Related links  (0) Type Size Date
Software  (0) Type Size Date
Solution briefs  (0) Type Size Date
Technical guides  (0) Type Size Date
Videos  (0) Type Size Date
White papers  (0) Type Size Date