HP Intelligent Management Center for BYOD solutions

while providing a cost-effective option for enterprises. Based on a recent SANS BYOD/mobility security survey1 of 500 IT professionals. while reducing the IT burden with an easy-to-use self-registration process. While more and more organizations are adopting the new initiative of “Bring Your Own Device” (BYOD). you require a solution that provides adequate visibility of network traffic and application usage for capacity planning and compliance reporting. and controlling wired and wireless networks.Brochure | Meet BYOD challenges Assigned to Is your device virtual app Who are you? compliant? networks Identity Device Authentication authentication authentication Corporate Authorized user Clean 1 2 3 network Unclean Behavior monitoring I’d like Quarantine 4 access area Ongoing compliance management What do you need for “Bring Your Own Device” to be effective? Mobile devices are an attractive choice for employees. In addition. securing user access.” 1 Kevin Johnson. IT organizations are facing challenging issues such as preserving network integrity. 2 . customers require a BYOD solution that offers: • Centralized functionality • Logging and monitoring • Ease of deployment An effective BYOD solution should deliver an access-agnostic solution that leverages a universal security and compliance policy across wired and wireless devices. “SANS Mobility/BYOD Security Survey. It also should integrate with your current infrastructure management tools to ease deployment. March 2012. since they help in increasing their productivity and flexibility. SANS.

IMC is part of the HP BYOD solutions. and secure Software-defined networking Unified wired and wireless networks Complete BYOD essentials Onboarding Provisioning Monitoring Unified infrastructure Threat detection Protect your network with the HP Intelligent Management Center BYOD solutions The HP Intelligent Management Center (IMC) BYOD solutions are based on a platform that delivers single-pane-of-glass management with complete visibility across the entire enterprise network. scalable. delivered by IMC. creating a single network for wired as well as wireless connectivity. 3 . unified approach to solving BYOD challenges. and monitoring. provisioning. which go beyond what is offered in the market—with a complete. Finally. and real-time traffic quarantine • Centralized authentication. and accounting support • Seamless policy enforcement across wired and wireless infrastructures from HP and other vendors • Unified monitoring of device traffic and user behavior • Comprehensive. unified bring-your-own-device solution Simple. authorization.Brochure | Meet BYOD challenges Complete. the HP BYOD solutions help prepare your network for software-defined networking (SDN). advanced device profiling. The HP BYOD solutions start with the BYOD essentials—simple and secure device onboarding. BYOD essentials cover: • Secure user authentication. unified network management with third-party network support IMC further pushes the BYOD solution essentials to deliver unified network management.

Vendor + OS + Vendor + OS + Device + iNode or MDM 802. This flexibility is afforded by IMC’s modular and expandable architecture. • IMC Network Traffic Analyzer (NTA) provides traffic monitoring and capacity planning. also based on IMC. • IMC User Behavior Auditor (UBA) provides usage monitoring. and self-registration. ACL User traffic Traffic inspection Monitoring and management Network analysis HP IMC BYOD solutions―key components The IMC BYOD solutions are extremely flexible and can be tailored to meet certain BYOD challenges and requirements. which provides secure. To get started with an IMC BYOD solution. • IMC EAD reduces network exposure and monitors the endpoints. A comprehensive BYOD solution relies on the following IMC modules: • IMC UAM provides user and guest access management. if you are looking for growth and flexibility. The IMC Smart Connect Virtual Appliance is a great solution for smaller deployment. HP also offers BYOD solutions delivered as a virtual appliance. you need the base platform IMC Standard Edition and IMC User Access Manager (UAM). • IMC Wireless Services Manager (WSM) provides converged wired and wireless management. Alternatively. However. so that you can onboard mobile devices based on compliance with MDM policies. 4 . or wireless management. IMC Endpoint Admission Defense (EAD) integrates with mobile device management (MDM). device fingerprinting.1X Device Location + SSID + Time IMC UAM IMC UBA+NTA TP IPS IMC WSM 6 Authorization 7 Behavior 8 Live 9 Unified wired policy monitoring quarantine and wireless enforcement management VLAN. You can add modules to the base solution to expand your BYOD solution capabilities—and cover posturing. the HP IMC Standard with additional modules could be the right choice. policy-based network access.Brochure | Meet BYOD challenges IMC UAM IMC UAM DHCP Agent IMC UAM IMC EAD 1 Device 2 User 3 Device 4 Access 5 Posture authentication authentication fingerprinting condition check MAC Portal registration. user and traffic monitoring. as it offers all the necessary tools for your BYOD requirement.

5 . The IMC platform functionality enables the operators to apply varying levels of bandwidth traffic to different services and applications. the module reduces the risk of malicious code infections or other security breaches by detecting endpoint patches. and FTP access. In addition. UBA generates summarized audit reporting with the ability to query.Brochure | Meet BYOD challenges IMC User Access Manager The IMC UAM module provides all the capability required for network access. enabled by integration with HP TippingPoint Intrusion Prevention solutions. It supports user identity authentication and extends management to wired. The UBA module provides control over filtering. Based on the state of the mobile device as reported by the MDM solution. enhance. sort. and remote network users. This BYOD security solution provides centralized authentication. UAM also includes device fingerprinting to enable granular user policy management. address resolution protocol attacks. IMC Endpoint Admission Defense The IMC EAD module reduces network exposure by integrating security policy management and endpoint posture assessment to identify and isolate risks at the network edge. as well as the status of system services. data aggregation. abnormal traffic. viruses. For mobile devices. database access and operations. Administrators can also audit user activity by email sender or receiver addresses. The module also monitors Internet egress traffic. and troubleshoot networks. it integrates with leading MDM vendors to provide mobile device posturing. and collaboration of network device management and user management on a single unified platform. This enables the integration. authorization. IMC User Behavior Auditor The IMC UBA module provides enhancement of overall network performance by enabling network administrators to audit user behavior. file transfers. the installation and running of sensitive software. monitor. correlation. IMC will onboard the device based on defined onboarding policies. and group audit results by many fields as well as the ability to save audit results to a file for download. and application identification and definitions. and accounting management of endpoints that connect and use network services. wireless. The module helps reduce vulnerabilities and security breaches through its policy management and through live quarantine. as well as identify bottlenecks and apply corrective measures for enhanced throughput. helping administrators analyze the bandwidth usage of specific applications and monitor the impact of non-business applications. IMC Network Traffic Analyzer The IMC NTA module is a graphical network-monitoring tool that provides real-time information about users and applications consuming network bandwidth. EAD provides continual monitoring of endpoints. The IMC NTA module’s network bandwidth statistics help plan.

IMC Smart Connect solutions provide comprehensive network management.Brochure | Meet BYOD challenges IMC Wireless Service Manager The IMC WSM integrates wireless service management into IMC’s network management platform. and self-registration. topology. performance. Unified BYOD monitoring further enables administrators to plan for capacity and comply with regulatory requirements. WLAN intrusion detection and defense. The IMC Smart Connect Virtual Appliance includes IMC Standard Edition and IMC UAM. it includes unified policy enforcement and converged network management across wired and wireless environments. And in addition. they provide unified management of wired and wireless networks. and WLAN service reporting for HP wireless infrastructure. The module detects wireless attacks as well as rogue access points and provides alerts on vulnerabilities in the network. This software is offered as a virtualization appliance to allow for zero installation and easy deployment. Together. performance monitoring. HP IMC BYOD solution bundles IMC Smart Connect Virtual Appliance The IMC Smart Connect Virtual Appliance edition makes it easy for you to deploy BYOD as a single software package. IMC Smart Connect Virtual Appliance with WLAN Manager The IMC Smart Connect Virtual Appliance with WLAN Manager offers all the capabilities of the previously described virtual appliance. The WSM module provides WLAN device configuration. RF coverage and planning. enabling operators to monitor how wireless network usage. device fingerprinting. WSM generates historical reporting. and roaming patterns have changed over months or years. 6 . including third-party network management. which provides user and guest access management. As a bonus. The virtual appliance comes in two packages—IMC Smart Connect Virtual Appliance and IMC Smart Connect Virtual Appliance with WLAN Manager.

7 . and control. visibility. The IMC BYOD solutions provide single-pane-of-glass management with centralized security. You could also select IMC Smart Connect Virtual Appliance or IMC Smart Connect Virtual Appliance with WLAN Manager for zero installation and ease of deployment.Brochure | Meet BYOD challenges Network IMC solutions User access Device health User monitoring Wireless management Traffic monitoring management Base components IMC Standard Edition User Access Manager Additional components Wireless Services Manager Endpoint Admission Defense User Behavior Analyzer Network Traffic Analyzer Virtual appliance IMC Smart Connect Virtual Appliance IMC Smart Connect Virtual Appliance with WLAN Manager Why choose an HP IMC BYOD solution Simple. Our modular design allows you the flexibility to customize solutions based on your needs. secure. HP IMC BYOD solutions are designed to address the complex BYOD challenges that IT professionals are facing due to the proliferation of personal devices across enterprises. and scalable.

March 2014. management of hp. Rev. 2 . Learn more at from acquisition of new existing assets. 4AA4-5149ENW. HP shall not be liable for technical or editorial errors or omissions contained herein. and removal of unneeded equipment Sign up for updates Share with colleagues Rate this document © Copyright 2013–2014 Hewlett-Packard Development hp.P. Nothing herein should be construed as constituting an additional warranty. The information contained herein is subject to change without notice.Brochure | Meet BYOD challenges Customize your IT lifecycle management. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Developing solutions for major social and environmental challenges hp.