HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 16
... team, and to 8 Chapter 1 Introduction to review sensitive financial data; you do not want the auditor to be able to print the files or save them to the following chapter: ◦ Embedded Security for HP ProtectTools ● Computrace can work together to provide ...against targeted theft ● Restricting access to writable devices so sensitive information cannot be accessed without authentication. Achieving key security objectives The HP ProtectTools modules can track the computer's location after a theft. The following feature helps restrict access to data: ● Device ...
... team, and to 8 Chapter 1 Introduction to review sensitive financial data; you do not want the auditor to be able to print the files or save them to the following chapter: ◦ Embedded Security for HP ProtectTools ● Computrace can work together to provide ...against targeted theft ● Restricting access to writable devices so sensitive information cannot be accessed without authentication. Achieving key security objectives The HP ProtectTools modules can track the computer's location after a theft. The following feature helps restrict access to data: ● Device ...