ProCurve Networking by HP and Microsoft have launched a solution to protect networks with open, secure, standards-based interoperability that integrates ProCurve’s trusted infrastructure, policy management system and Microsoft’s Network Access Protection (NAP) technology.

ProCurve Identity Driven Manager (IDM) policy management tool is now compatible with Microsoft NAP technology, providing customized network access policies for admission of users and clients across both wired and wireless environments.
“Having ProCurve switches, access points and IDM complement Microsoft’s NAP architecture provides customers with robust network security,” says Lorna Hardie, business unit manager for ProCurve Networking by HP in South Africa. “Through this integration, ProCurve continues to deliver on its ProActive Defense strategy, which combines access control and network immunity with trusted architecture to defend against potential security threats.”
Calvin Choe, director of technical business development in the Enterprise Networking Group at Microsoft, says: “The integration of Microsoft Network Access Protection and ProCurve networking products provides customers with a network security solution to protect their information assets.”
ProCurve IDM provides network administrators with the ability to centrally define and apply policy-based network access rights that allow the network to adapt automatically to the needs of users and devices as they connect, thereby enforcing network security while providing appropriate access to network users and devices.
Microsoft Network Access Protection is a policy enforcement technology built into the Windows Vista and Windows Server 2008 operating systems that allows customers to better protect network assets from unhealthy computers by enforcing compliance with network health policies. Microsoft’s Network Access Protection technology is available with Windows Vista and Windows Server 2008 and will be available with Windows XP SP3.
Microsoft and ProCurve Networking by HP are longtime collaborators. Their work includes defining the IEEE 802.1X standard and their involvement within the Trusted Computing Group to develop and promote open, vendor-neutral, industry-standard specifications.