HP iPAQ 610 HP iPAQ Security Solutions

HP iPAQ 610 - Business Navigator Manual

HP iPAQ 610 manual content summary:

  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 1
    Handheld Security Solutions Overview ...2 Security ...2 HP ProtectTools...3 Using HP ProtectTools...3 Odyssey Client...3 Biometric Fingerprint Reader (HP iPAQ hx2700 series only 4 Special issues related to security...4 Recovering from a locked device...5 Passphrases ...5 Performance considerations
  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 2
    on your HP iPAQ is serious business. There are many ways that you can protect your HP iPAQ. Taking advantage of the built-in security features is a great way to start protecting your HP iPAQ. These security features are powerful defenses against data theft. Your login name and password are great
  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 3
    ® (CMG) provides solutions that reduce specific security risks to handheld users. These security solutions provide certain advantages that allow you to protect your device more effectively. The first layer of security involves PIN or password access for HP iPAQ devices. A second layer of defense
  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 4
    access and does not have to be remembered like a password or PIN. You can also find more specific information about how to enroll fingerprints using HP ProtectTools in the User's Guide on the Companion CD. (If you purchased an HP iPAQ hx2700 Pocket PC, the Companion CD is available with your
  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 5
    on a memory card. This data can be retrieved from the card if HP ProtectTools is reinitiated on the HP iPAQ using the same passphrase used previously when the data was encrypted on the card. Thus, like PINs and passwords, it is important to store the passphrase in a secure location. Passphrases must
  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 6
    key length is extended to 256 bits for encryption. To obtain device-specific instructions on how to create, change, and start a VPN connection using your HP iPAQ, refer to the documentation that came with your device. To get specific information about turning on or off WLAN and Wi-Fi, refer to
  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 7
    tasks such as allowing sales people to access customer they would otherwise perform on their business or home PCs. Before trying to a fee for this service. Convenience and increased came with your HP iPAQ. WLAN standards /s) of overall throughput, was the original implemented standard. • 802.11b is
  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 8
    . This standard does not define any specific security protocol, but is based on EAP to protect, such as credit card numbers or passwords. Personal firewalls can also prevent Web servers from Windows Mobile 2003 and Windows Mobile 5.0 users can download a free 30-day trial version of the software
  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 9
    802.1x SSID Service Set Identifier TKIP The standard specification for wireless local of 32 characters and is case sensitive.). Improved data encryption remote offices, telecommuters, etc.) secure access to their organization's network by way of the Internet. Physical hardware or computer software
  • HP iPAQ 610 | HP iPAQ Security Solutions - Page 10
    /atwork/default.mspx www.pointsec.com www.zonelabs.com © 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

HP iPAQ Handheld Security Solutions
Overview
..........................................................................................................................................................
2
Security
........................................................................................................................................................
2
HP ProtectTools
...............................................................................................................................................
3
Using HP ProtectTools
.................................................................................................................................
3
Odyssey Client
.................................................................................................................................................
3
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)
...........................................................................
4
Special issues related to security
.....................................................................................................................
4
Recovering from a locked device
.................................................................................................................
5
Passphrases
................................................................................................................................................
5
Performance considerations related to data encryption
...............................................................................
5
Network Connections
.......................................................................................................................................
6
Virtual Private Network and Wired Equivalency Privacy
..............................................................................
6
Wi-Fi Protected Access (WPA) and TKIP/AES
................................................................................................
6
Wireless fidelity (Wi-Fi)
................................................................................................................................
7
Wi-Fi hotspots
..............................................................................................................................................
7
WLAN standards
..........................................................................................................................................
7
Additional Security Solutions
...........................................................................................................................
8
Terminology
.....................................................................................................................................................
9
For more information
......................................................................................................................................
10
Call to action
..................................................................................................................................................
10