HPE IMC Endpoint Admission Defense (EAD) Software reduces network exposure by integrating security policy management and endpoint posture assessment to identify and isolate risks within the network. IMC EAD Software reduces the risk of malicious code infections and other security breaches by detecting breaches like viruses, abnormal traffic, or the running of sensitive software. Additionally the software can also protect sensitive data through control of computer peripherals.
- Automatically blocks suspicious incoming traffic.
- Protects sensitive data through control of computer peripherals.
- Reduces infection risk of network terminal.
- Integrated security policy management and endpoint posture assessment.
- Reporting capability for greater inventory and accounting control.
Security Control with Integration of User Management and Device Manageme
The HPE IMC Endpoint Admission Defense (EAD) Software assists network administrators in managing security policies and reducing network breaches.
Gives the administrator the ability to set security policies based upon shared data to create logical workgroups for information sharing and collaboration.
Network administrators can use IMC EAD Software to create richer, more informative reports on network devices.
IMC EAD Software integrates with leading enterprise mobility management vendors for mobile endpoint management and compliance.
Complete Security Evaluation Efficiently Reduces Network Vulnerabilities
The HPE IMC Endpoint Admission Defense (EAD) Software reduces network vulnerabilities by determining endpoint compliance to defined policies.
Provides end-to-end virtualization capabilities across all nodes and can send security policies throughout the system.
Network administrators can leverage integration to patch management software like Microsoft Systems Management Server as well as tools from Symantec, McAfee, and Trend Micro.
Greater Network Device Awareness with Built-in Desktop Asset Management
The HPE IMC (IMC) Endpoint Admission Defense (EAD) Software provides a complete inventory of endpoints to understand what exists on the network.
The IMC EAD Software gives network administrators the power to control computer peripherals to prevent crimes like data theft.
Network administrators have more control of software inventory to generate reports or run queries.