H P Protec tTools Sec uri ty Softwa re 2 010 Technica l white paper Table of contents Introd uc ti o n ...
10 Manager for HP ProtectTools solves that problem. In doing so, it enables a new usage model for personal computing devices. Device Access Manage
11 C onfiguration, Device Access Manager presents a device tree view derived from the W indows Device Manager. Individual devices or an entire class
12 Fi g u r e 7. Drive Encryption for HP ProtectTools Drive Encryption for ProtectTools is based on McAfee endpoint protection technology. McAfee
13 or USB storage is disallowed. This means that software designed to bypass the operating system password protection cannot run if the computer is
14 N either the answers to the three questions nor the encryption key are stored in memory. The only way to access the encrypted password is to answ
15 Table 4 shows Embedded Security for HP ProtectTools features and benefits. Table 4. Embedded Security for HP ProtectTools features and benefits F
16 and passwords. A t mo st si tes tha t requi re a pa ssword, a window pops up over your browser and gives you the option to log in using Face Rec
17 Fi g u r e 9. HP ProtectTools File Sanitizer setup menu File sanitization is more intensive process than simple file deleti
18 electronic transactions and communications is increasingly required by regula tions in fina nce, la w and healthcare applications. Privacy Ma
19 environments. W hile that takes care of the security exposure, it also prevents the benefits of a very useful communications tool. Privacy Manag
2 Introduc tion Data security can have a direct impact on the health of your business, and most businesses rank security among their top concerns. T
20 Fea t u r e Benefit Backup and restore credentials stored on a user’s Java Card Provides a mechanism to recover from a situation where a user or
21 SF = Standard Feature / OF = Optional Feature / N = N ot Availa ble HP ProtectTools Support HP ProtectTools Security Manager A A A P Credent
22 A. Currently the following components are available. • HP ProtectTools Security • Embedded Security for HP ProtectTools • File Sanitizer for
23 Q. If a TPM encrypted file is copied moved to a second system which does not have the key to decrypt the file, what would happen to the file. W
24 Q. If multiple PCs are used by the same user, can his or her identity be used on the different machines? A. N o, however a user’s credential can
For more informa tion To learn more about HP ProtectTools, contact your local HP sales representative or visit our website at www.hp.com/ products
3 business notebooks, desktops and workstations under a common architecture and single user interface (Figure 1 ). Fi g u r e 1. HP ProtectTools
4 Fi g u r e 2. HP ProtectTools Administrative Console The HP ProtectTools Security Manager framework allows you to adapt HP ProtectTools functio
5 Login methods can also be selected either individually or in combination to achieve multifactor authentication. The HP ProtectTools Java C ard is
6 Fi g u r e 3. HP ProtectTools Security Manager Backup and Restore menu Using HP ProtectTools backup and restore, users have the flexibility to:
7 • File Sanitizer for HP ProtectTools • C omputr a ce ® LoJack Pro for HP ProtectTools o Tracking and recovery requires a fee based subscriptio
8 • Support for smart cards (including HP ProtectTools Java C ards), biometric fingerprint security, TPM embedded security chips, USB tokens, virt
9 Fi g u r e 5. Key features of HP ProtectTools with DigitalPersona Pro DigitalPersona Pro protects applications and data by simplifying securit
Comments to this Manuals