HP iPAQ 112 HP iPAQ Security Solutions

HP iPAQ 112 - Classic Handheld Manual

HP iPAQ 112 manual content summary:

  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 1
    Handheld Security Solutions Overview ...2 Security ...2 HP ProtectTools...3 Using HP ProtectTools...3 Odyssey Client...3 Biometric Fingerprint Reader (HP iPAQ hx2700 series only 4 Special issues related to security...4 Recovering from a locked device...5 Passphrases ...5 Performance considerations
  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 2
    to easily login with a swipe of the finger (HP iPAQ hx2700 series Pocket PC only) and/or with a PIN (personal identification number). This feature provides highly secure, convenient, and fast authentication-without users having to remember passwords. • Full virtual private network (VPN) and WEP
  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 3
    Inc. CREDANT Mobile Guardian® (CMG) provides solutions that reduce specific security risks to handheld users. These security solutions provide certain advantages that allow you to protect your device more effectively. The first layer of security involves PIN or password access for HP iPAQ devices
  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 4
    access and does not have to be remembered like a password or PIN. You can also find more specific information about how to enroll fingerprints using HP ProtectTools in the User's Guide on the Companion CD. (If you purchased an HP iPAQ hx2700 Pocket PC, the Companion CD is available with your device
  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 5
    the PIN/password and the answer to the preselected question, there is no way to recover from a locked device without losing data. The device will prompt for a hard or clean reset, and all memory will be set back to the default factory condition which includes deleting data in the iPAQ File Store
  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 6
    networks: SSID, user name, password, and domain name. You will then be able to select an available network from an on-screen list. To get specific information about configuring and logging on to networks, refer to the documentation that came with your HP iPAQ. Virtual Private Network and Wired
  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 7
    WLANs enable a variety of mobile transactions such as Internet and e- otherwise perform on their business or home PCs. Before trying to connect to a wireless fee for this service. Convenience and increased productivity make Wi-Fi hotspots CD that came with your HP iPAQ. WLAN standards IEEE wireless
  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 8
    any specific security credit card numbers or passwords. Windows Mobile 2003 and Windows Mobile 5.0 users can download a free 30-day trial version of the software. Pointsec® for Pocket PC provides convenient, real-time encryption of information on mobile devices as well as external storage cards
  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 9
    802.1x SSID Service Set Identifier The standard specification for wireless of 32 characters and is case sensitive.). Improved data encryption for Internet. Physical hardware or computer software that acts as a hub for WLAN is a wireless network in which a mobile user can connect to a local area
  • HP iPAQ 112 | HP iPAQ Security Solutions - Page 10
    For more information iPAQ Mobile http://www.hp.com/go/iPAQ http://hp.com/sbso/wireless/index.html MSN Mobile http://www.mobile.msn.com/pocketpc Call to action www.hp.com http://welcome.hp.com/country/us/en/support.html www.hp.com/sbso/wireless/secure_wlan_mobile.pdf www.bluefiresecurity.com www.funk
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

HP iPAQ Handheld Security Solutions
Overview
..........................................................................................................................................................
2
Security
........................................................................................................................................................
2
HP ProtectTools
...............................................................................................................................................
3
Using HP ProtectTools
.................................................................................................................................
3
Odyssey Client
.................................................................................................................................................
3
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)
...........................................................................
4
Special issues related to security
.....................................................................................................................
4
Recovering from a locked device
.................................................................................................................
5
Passphrases
................................................................................................................................................
5
Performance considerations related to data encryption
...............................................................................
5
Network Connections
.......................................................................................................................................
6
Virtual Private Network and Wired Equivalency Privacy
..............................................................................
6
Wi-Fi Protected Access (WPA) and TKIP/AES
................................................................................................
6
Wireless fidelity (Wi-Fi)
................................................................................................................................
7
Wi-Fi hotspots
..............................................................................................................................................
7
WLAN standards
..........................................................................................................................................
7
Additional Security Solutions
...........................................................................................................................
8
Terminology
.....................................................................................................................................................
9
For more information
......................................................................................................................................
10
Call to action
..................................................................................................................................................
10