HP ProtectTools Security Software,Version 6.0 User Guide
Page 17
...targeted theft An example of this type of incident would be accessed without authentication. See the following chapter: ◦ Embedded Security for HP ProtectTools on site and has been given computer access to sensitive data Suppose a contract auditor is working on page 49 ● ... on page 54. See the following feature helps restrict access to data: Device Access Manager for HP ProtectTools on page 57 Restricting access to review sensitive financial data; ENWW Achieving key security objectives 7 See Device class configuration (advanced) on page 29 ● DriveLock helps...
...targeted theft An example of this type of incident would be accessed without authentication. See the following chapter: ◦ Embedded Security for HP ProtectTools on site and has been given computer access to sensitive data Suppose a contract auditor is working on page 49 ● ... on page 54. See the following feature helps restrict access to data: Device Access Manager for HP ProtectTools on page 57 Restricting access to review sensitive financial data; ENWW Achieving key security objectives 7 See Device class configuration (advanced) on page 29 ● DriveLock helps...