button1-blue

button2-blue2

button3-blue2

HP Identity Driven Manager

HP Identity Driven Manager Software Series

HP Identity Driven Manager (IDM), a plug-in to HP PCM+, dynamically provisions network security and performance settings based on user, device, location, time, and endpoint posture. Identity Driven Manager provides network administrators with the ability to centrally define and apply policy-based network access rights that allow the network to automatically adapt to the needs of users and devices as they connect, thereby enforcing network security while providing appropriate access to authorized network users and devices. Identity Driven Manager is a powerful tool that allows network administrators to efficiently manage the users and devices connecting to their networks.

  • Appropriate access to network resources
  • Policy- and identity-based network access rights
  • Dynamic configuration of security and performance
  • Microsoft® Active Directory and NAP integration
  • Simple Network Access Control option

alt

Performance

  • Traffic prioritization — can be automatically applied to each session based on user, device, location, and time of day, allowing appropriate prioritization of network traffic
  • Rate limiting — inbound and outbound rate limits can be automatically applied to a session in order to limit the impact of lower-priority connections and reserve bandwidth for important business use

Security

  • Policy-based network access rights — network access policies specifying network security and performance are defined based on the user, time, location, device, and endpoint posture and then dynamically enforced at the edge of the network, where users and devices connect
  • Automatic VLAN assignment — users can be automatically assigned to the appropriate VLAN based on their identity, device, device posture, location, and time of day
  • User-based access control lists (ACLs) — users can be allowed or denied access to network resources (e.g., servers, printers) based on the destination IP address or a range of IP addresses, and/or to network services (e.g., Web pages, instant messaging, or FTP) based on well-known or user-defined TCP/UDP ports
  • Endpoint posture awareness — when used with an endpoint integrity solution such as Microsoft Network Access Protection (NAP) or the StillSecure Safe Access solution, access policies can be based on the posture of the endpoint connecting to the network, allowing noncompliant endpoints to be isolated until they comply with organizational policies

Integration

  • HP network management solutions
    • HP PCM Plus — IDM is delivered on the HP PCM+ Secure Domain Architecture, which delivers increased scalability and security
    • HP Network Immunity Manager — IDM delivers enhanced integration with HP Network Immunity Manager, which monitors the network for threats and applies policy-based mitigations to offending endpoints or users; IDM and NIM work together to provide consistent and effective network security
  • RADIUS authentication servers — integrates with standard RADIUS authentication servers, including Microsoft Network Policy Server (NPS), Microsoft Internet Authentication Service (IAS), and FreeRADIUS on Linux platforms, enforcing network access policies through RADIUS authentication and authorization
  • Microsoft Network Access Protection (NAP) — cooperates with Microsoft NAP, bringing together NAP endpoint health status with IDM network access policy enforcement
  • User directory integration
    • Microsoft Active Directory — connects to Microsoft Active Directory, automatically mapping Active Directory group membership to IDM Access Policy Groups; changes made in Active Directory are reflected in IDM so that user management occurs in one centralized place
    • LDAP directories or XML files — user and group membership can be imported from an LDAP directory or XML file

Ease of use

  • NEW Simple Network Access Control
    • Self-registration — reduces administration effort by enabling end users to add themselves to the access control database; user access is validated via an Active Directory; no additional software is required on end-user systems
    • Auto-allow groups — devices such as IP phones, printers, and certain uncontrolled devices can be given network access and segregated by device type
  • Graphical user interface (GUI) — IDM provides a powerful GUI for defining network access policies and monitoring users on the network; administrators can quickly see which users are currently on the network and easily drill down to know where and when they connected
  • Secure access wizard — simplifies the process of configuring system components by walking administrators through security configurations on network devices as well as configuring the authentication server with the list of these devices
  • Agent auto-update — simplifies updates to the software system by automatically updating the IDM agents when the IDM server is updated
  • Auto-discovery of solution components — RADIUS servers with IDM agents, RADIUS realms, and users are automatically discovered and assigned to a default policy group to highlight them for the administrator
  • Detailed reporting — IDM provides reports of network access that can be automated to run at specified times or created on demand; reports are useful for documenting network access by users and groups, as well as for investigating failed network access attempts in order to identify potential network attacks

Free Consultation

Due to our numerous partnerships, we can provide unbiased opinions on the best solution for your environment.

Unbeatable Prices

Our partnership levels give us the highest product discounts which we pass on as savings to our customers.

Pro Services

Finish your IT projects on-time and under budget with our nation-wide team of senior level engineers.

24x7 Tech Support

Rest assured knowing that our U.S. based IT support team is here for you on nights, weekends and when you need us most.