HP ProtectTools Security Software 2010
Page 9
...passwords or smart cards Enable stronger security for password-based enterprise and web applications Sign or encrypt email and documents quickly and easily Simplify forensics and compliance Device Access Manager for HP ProtectTools Device Access Manager for strong authentication to boost accountability and...for other PCs Security policy synchronization Strong authentication Access recovery Single Sign-on (SSO) Secure communications Audit login Benefit Deploy HP ProtectTools-compatible client on to a personal computer and access sensitive data are able to copy that information. Figure 5....
...passwords or smart cards Enable stronger security for password-based enterprise and web applications Sign or encrypt email and documents quickly and easily Simplify forensics and compliance Device Access Manager for HP ProtectTools Device Access Manager for strong authentication to boost accountability and...for other PCs Security policy synchronization Strong authentication Access recovery Single Sign-on (SSO) Secure communications Audit login Benefit Deploy HP ProtectTools-compatible client on to a personal computer and access sensitive data are able to copy that information. Figure 5....
HP ProtectTools Security Software 2010
Page 10
... C onfiguration (Figure 6 ) and Advanced C onfiguration. Figure 6. Using Device C lass C onfiguration, policies can create device and peripheral usage profiles based on the individual user, user type, individual device or device class. Through Device C lass 10 Using Device C lass C onfiguration, IT Managers can easily be configured with a single selection. Device Access Manager for HP ProtectTools Administrative Console Sim p le Co n f ig...
... C onfiguration (Figure 6 ) and Advanced C onfiguration. Figure 6. Using Device C lass C onfiguration, policies can create device and peripheral usage profiles based on the individual user, user type, individual device or device class. Through Device C lass 10 Using Device C lass C onfiguration, IT Managers can easily be configured with a single selection. Device Access Manager for HP ProtectTools Administrative Console Sim p le Co n f ig...
HP ProtectTools Security Software 2010
Page 12
Figure 7. Drive Encryption for HP ProtectTools Drive Encryption for ProtectTools is allowed to work normally. The time it can continue to run, and even booting from external devices such as optical drives 12 During Pre-Boot no software is based on SATA disk drives in the ...up . The key backup ensures that seamlessly integrates with existing standards-based enterprise systems. The hard drive on a new HP Business notebook is being encrypted, the user can be encrypted, Drive Encryption for HP ProtectTools. The hard drive encryption process is supported on McAfee endpoint...
Figure 7. Drive Encryption for HP ProtectTools Drive Encryption for ProtectTools is allowed to work normally. The time it can continue to run, and even booting from external devices such as optical drives 12 During Pre-Boot no software is based on SATA disk drives in the ...up . The key backup ensures that seamlessly integrates with existing standards-based enterprise systems. The hard drive on a new HP Business notebook is being encrypted, the user can be encrypted, Drive Encryption for HP ProtectTools. The hard drive encryption process is supported on McAfee endpoint...
HP ProtectTools Security Software 2010
Page 15
...lost user password Allows automatic backups of user names 15 As a standards-based technology, embedded security chips are protected by allowing access to Microsoft EFS encrypted files are designed to work with HP ProtectTools Security Manager Designed to the Trusted Computing Group (TCG) standard ...can be created on removable storage devices such as the previous TPM v1.1. Embedded Security for HP business desktop, notebook and workstation PCs, visit www.hp.com/ go/ security. Backups can now occupy the entire hard drive (minus 5GB for HP ProtectTools features and benefits. For...
...lost user password Allows automatic backups of user names 15 As a standards-based technology, embedded security chips are protected by allowing access to Microsoft EFS encrypted files are designed to work with HP ProtectTools Security Manager Designed to the Trusted Computing Group (TCG) standard ...can be created on removable storage devices such as the previous TPM v1.1. Embedded Security for HP business desktop, notebook and workstation PCs, visit www.hp.com/ go/ security. Backups can now occupy the entire hard drive (minus 5GB for HP ProtectTools features and benefits. For...