HP 540 HP ProtectTools - Windows Vista and Windows XP - Page 8
HP ProtectTools features
View all HP 540 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 8 highlights
HP ProtectTools features The following table details the key features of HP ProtectTools modules: Module Key features Credential Manager for HP ProtectTools ● Credential Manager acts as a personal password vault, streamlining the logon process with the Single Sign On feature, which automatically remembers and applies user credentials. ● Single Sign On also offers additional protection by requiring combinations of different security technologies, such as a Java™ Card and biometrics, for user authentication. ● Drive Encryption for HP ProtectTools (select models ● only) Password storage is protected through software encryption and can be enhanced through the use of a TPM embedded security chip and/or security device authentication, such as Java Cards or biometrics. Drive Encryption provides complete, full-volume hard drive encryption. ● Privacy Manager for HP ProtectTools (select models ● only) Drive Encryption forces pre-boot authentication in order to decrypt and access the data. Privacy Manager utilizes advanced logon techniques to verify the source, integrity, and security of communication when using email, Microsoft® Office documents, or instant messaging (IM). File Sanitizer for HP ProtectTools ● File Sanitizer allows you to securely shred digital assets (sensitive information including application files, historical or Web-related content, or other confidential data) on your computer and periodically bleach the hard drive. BIOS Configuration for HP ProtectTools ● BIOS Configuration provides access to power-on user and administrator password management. ● BIOS Configuration provides an alternative to the pre-boot BIOS configuration utility known as Computer Setup. ● BIOS Configuration enablement of automatic DriveLock support, which is enhanced with the embedded security chip, helps protect a hard drive from unauthorized access, even if it is removed from a system, without requiring the user to remember any additional passwords beyond the embedded security chip user password. 2 Chapter 1 Introduction to security