More Information

Sort by:
1 - 1 of 1 items
HPE IMC Endpoint Admission Defense Software Module with 50-user E-LTU

HPE IMC Endpoint Admission Defense Software Module with 50-user E-LTU

Electronic license for HPE IMC Endpoint Admission Defense module for 50 nodes


Fulfilled by

  • Automatically blocks suspicious incoming traffic.
  • Protects sensitive data through control of computer peripherals.
  • Reduces infection risk of network terminal.
  • Integrated security policy management and endpoint posture assessment.
  • Reporting capability for greater inventory and accounting control.

Security Control with Integration of User Management and Device Manageme

The HPE IMC Endpoint Admission Defense (EAD) Software assists network administrators in managing security policies and reducing network breaches.

Gives the administrator the ability to set security policies based upon shared data to create logical workgroups for information sharing and collaboration.

Network administrators can use IMC EAD Software to create richer, more informative reports on network devices.

IMC EAD Software integrates with leading enterprise mobility management vendors for mobile endpoint management and compliance.

Complete Security Evaluation Efficiently Reduces Network Vulnerabilities

The HPE IMC Endpoint Admission Defense (EAD) Software reduces network vulnerabilities by determining endpoint compliance to defined policies.

Provides end-to-end virtualization capabilities across all nodes and can send security policies throughout the system.

Network administrators can leverage integration to patch management software like Microsoft Systems Management Server as well as tools from Symantec, McAfee, and Trend Micro.

Greater Network Device Awareness with Built-in Desktop Asset Management

The HPE IMC (IMC) Endpoint Admission Defense (EAD) Software provides a complete inventory of endpoints to understand what exists on the network.

The IMC EAD Software gives network administrators the power to control computer peripherals to prevent crimes like data theft.

Network administrators have more control of software inventory to generate reports or run queries.

* Estimated price, value-Added tax included.

How can we help

Get advice, answers, and solutions when you need them. For general questions, call us at +1 (650) 687-5817.

Max 4 items can be added for comparison.