Compaq nc6000 Wireless Security

Compaq nc6000 - Notebook PC Manual

Compaq nc6000 manual content summary:

  • Compaq nc6000 | Wireless Security - Page 1
    Wireless Security Executive Summary ...2 Problem Statement ...2 Historical information/background...2 Mobile Device Security and HP Protect Tools 3 Wired Equivalent Privacy...4 Wi-Fi Protected Access ...5 WPA Pre-Shared Key...6 IEEE 802.11i ...6 Emerging Mobile Applications ...7 Virtual Private
  • Compaq nc6000 | Wireless Security - Page 2
    access to corporate data from any remote location. The key to securing a wireless network lies in understanding the issues and available solutions through the entire system - from the moment the mobile user powers on the mobile device...through log-in...through application initiation....through
  • Compaq nc6000 | Wireless Security - Page 3
    • Extensibility: solutions must adapt as security needs grow and newer technologies and features become available • Services: implementation support to assist the customer in enabling product-based security attributes is often expensive and complex The HP ProtectTools Security Manager is
  • Compaq nc6000 | Wireless Security - Page 4
    , all HP devices will support Wi-Fi Protected Access, and the high-level authentication provided by 802.1x Enhanced Authorization Protocol. Also, these devices support TKIP and AES Encryption. We are focused on what is available today, as it is hard to predict future changes in wireless technologies
  • Compaq nc6000 | Wireless Security - Page 5
    Service Set Identifier (SSID) is not a valid security measure. Because management frames on 802.11 Wireless Protocol) based authentication to Supports mutual authentication for stronger network access control. Previous methods authenticated the device, but not the source, for less security • Supports
  • Compaq nc6000 | Wireless Security - Page 6
    future benchmark for the industry and will be available on all wireless devices. IEEE 802.11i products are currently in development and will can be extended or certificate-based, in addition to other EAP types. HP products are focused on delivering "out-of-the-box" support for a broad range of EAP
  • Compaq nc6000 | Wireless Security - Page 7
    remote procedure calls over http. Hewlett Packard has had the optimal solution for this complicated problem since 1980, and can provide more robust security to mail, database and web servers. The HP solution is based on Trusted Operating system (TOS). One aspect of using this is reverse proxy. 7
  • Compaq nc6000 | Wireless Security - Page 8
    firewall from the device to the back-end servers and web services - such as wireless and mobile networks. Microsoft Exchange Server supports mobile devices, due to its low requirements of memory and CPU processing power. This has a huge impact on mobility in terms of battery life, time, price
  • Compaq nc6000 | Wireless Security - Page 9
    HP mobile devices. HP products interoperating with unique features of Cisco wireless LAN infrastructure As wireless LAN security improves over time, users will continue to find stronger data protection and user authentication, as well as improved interoperability. Microsoft Windows XP Service Pack
  • Compaq nc6000 | Wireless Security - Page 10
    Now and into the foreseeable future, mobile consumers and users can feel safer in implementing wireless solutions by remembering that standards-based wireless network security plus HP ProtectTools security technology equals a more secure mobile computing environment. For more information http://www.
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

1
Wireless Security
Executive Summary
..............................................................................................................................
2
Problem Statement
...............................................................................................................................
2
Historical information/background
.....................................................................................................
2
Mobile Device Security and HP Protect Tools
...........................................................................................
3
Wired Equivalent Privacy
......................................................................................................................
4
Wi-Fi Protected Access
.........................................................................................................................
5
WPA Pre-Shared Key
........................................................................................................................
6
IEEE 802.11i
......................................................................................................................................
6
Emerging Mobile Applications
..............................................................................................................
7
Virtual Private Network vs. Reverse Proxy
...............................................................................................
8
Conclusion
..........................................................................................................................................
9
For more information
..........................................................................................................................
10