HP Intelligent Management Center (IMC) is a modular, comprehensive resource management platform. With its extensive device support, IMC provides true end-to-end management for the entire network, and entire operation cycle.

The IMC module Endpoint Admission Defense (EAD) Software reduces network exposure by integrating security policy management and endpoint posture assessment to identify and isolate risks at the network edge. The security policy component allows administrators to control endpoint admission based on an endpoint's identity and posture.

If an endpoint is not compliant with software, network assets can be protected by blocking or isolating an endpoint's access. EAD reduces the risk of malicious code infections or other security breaches by detecting endpoint patches, viruses, Address Resolution Protocol attacks, abnormal traffic, the installation and running of sensitive software, as well as the status of system services.

EAD provides continual monitoring of endpoints.        



Endpoint access control and management: Endpoint Admission Defense (EAD) Software supplies control and management of endpoint equipment; this module requires that a fully licensed version of the IMC User Access Management (UAM) Software module be installed; the number of licensed nodes for EAD software must match the number of UAM licensed nodes
Enhancement of hierarchy management: the root node in the hierarchy architecture can set security policies for the entire network and distribute the policies to lower-level nodes; the lower-level nodes can send security and system status to the parent node, enabling the parent node to monitor lower-level nodes in real time; reports are also provided to administrators
Anti-X software policy management: the Anti-X checking feature enables administrators to set an Anti-X checking rule for each security policy made in IMC, rather than having a single rule for all security policies
IPv6 support: EAD policy server and Desktop Asset Management (DAM) server supports IPv6 communication with endpoints.
COA support: EAD supports change of authorization attributes for a session. This feature offers a quarantine mode for devices, including other vendor devices.


Complete security evaluation: EAD reduces network vulnerabilities by determining endpoint compliance to defined policies; security checks can include anti-virus, anti-spyware, anti-phishing, firewall, required patches, and hard disk encryption software. EAD supports auto-remediation options with integration to patch management software like Microsoft® Systems Management Server (SMS)/Windows® Server Update Services (WSUS), and with antivirus software from Symantec, McAfee, and Trend Micro
Endpoint identity: EAD software integrates with the UAM module to leverage existing user directories and groups to aid in the access and posture of policy creation; in addition to user name credentials, smart card and certificate authentication are also supported
Integration of user management and device management: Report correlation: using the IMC module design, data across modules can be shared to create richer, more informative reports (e.g., network devices can display end-user statistics). Policy correlation: in addition to reports, administrators can set policy based on shared data (e.g., policies or actions can be location specific). Module correlation: network traffic data can be correlated to display user-specific traffic analysis.
Integration of user management and topology management: on the topology map, user management operations are provided inthe menus of the access devices or access terminals (e.g., view user information, disconnect online users, and perform security checks); this makes user management more flexible
Desktop asset management (DAM): EAD software supports desktop asset management features to provide a complete inventory of endpoints; hardware specifications can be auto-discovered (i.e., CPU, memory), and software inventory can be completed to generate reports or run queries; in addition, administrators can set policies to aid in data theft prevention by controlling the computer peripherals, like USB storage; DAM also includes password and share controls and power management across endpoints

Warranty and support

Electronic and telephone support: limited electronic and business hours telephone support is available from HP for the entire warranty period; to reach our support centers, refer to www.hp.com/networking/contact-support; for details on the duration of support provided with your product purchase, refer to www.hp.com/networking/warrantysummary
Software releases: to find software for your product, refer to www.hp.com/networking/support; for details on the software releases available with your product purchase, refer to www.hp.com/networking/warrantysummary
  • Note: Information published at this site may refer to products, programs or services that are not available in your country. Consult your local HP business contact for information regarding the products, programs and services that may be available. *Prices set out herein are HP's recommended retail prices and inclusive of GST and exclusive of delivery at the time of publication. Prices, promotions, specifications and availability are applicable to New Zealand only and may change without prior notice. Prices are exclusive of options, accessories and consumables. Despite our best efforts, a small number of items may contain pricing, typography, or photography errors. Acceptance of order is subject to validation of correct prices and promotions by HP. Prices and offers given above may vary from reseller prices and offers.