HP iPAQ 612c HP iPAQ Security Solutions

HP iPAQ 612c - Business Navigator Manual

HP iPAQ 612c manual content summary:

  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 1
    HP iPAQ Handheld Security Solutions Overview ...2 Security ...2 HP ProtectTools...3 Using HP ProtectTools...3 Odyssey Client...3 Biometric Fingerprint Reader (HP iPAQ hx2700 series only 4 Special issues related to security...4 Recovering from a locked device...5 Passphrases ...5 Performance
  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 2
    asset for mobile business computing devices such as HP iPAQ handhelds. HP iPAQ devices address these security challenges head-on with Software, Inc. allows users to connect their device (HP iPAQ hw6900 Mobile Messenger series only) to multiple secured wireless networks. Odyssey Client supports
  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 3
    ® (CMG) provides solutions that reduce specific security risks to handheld users. These security solutions provide certain advantages that allow you to protect your device more effectively. The first layer of security involves PIN or password access for HP iPAQ devices. A second layer of defense
  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 4
    need to install the Odyssey Client software onto your HP iPAQ. For instructions on installing Odyssey Client via the CD specific information about how to enroll fingerprints using HP ProtectTools in the User's Guide on the Companion CD. (If you purchased an HP iPAQ hx2700 Pocket PC, the Companion
  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 5
    runs in the background, so you are able to perform other tasks on your HP iPAQ during this time. There are two methods to monitor the decryption process. To find out more about encrypting and decrypting data, refer to the documentation on the Companion CD or Getting Started CD that came with your
  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 6
    . To obtain device-specific instructions on how to create, change, and start a VPN connection using your HP iPAQ, refer to the documentation that came with your device. To get specific information about turning on or off WLAN and Wi-Fi, refer to the documentation on the Companion CD or Getting
  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 7
    . Many Wi-Fi hotspots charge their customers a fee for this service. Convenience and increased productivity make Wi-Fi hotspots attractive to users and connections in the documentation on the Companion CD or Getting Started CD that came with your HP iPAQ. WLAN standards IEEE wireless standards such
  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 8
    wireless Ethernet networks. This standard does not define any specific security protocol, but is based on EAP types documented software that protects devices, data, and networks. The security solutions help prevent intrusion, provide integrity management, encryption, and authentication enterprise
  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 9
    WEP) EAP or IEEE 802.1x SSID Service Set Identifier TKIP/AES VPN WAP WEP Wi-Fi Protected Area Definition The standard specification for wireless local area networks (WLAN), network by way of the Internet. Physical hardware or computer software that acts as a hub for users of wireless devices to
  • HP iPAQ 612c | HP iPAQ Security Solutions - Page 10
    iPAQ Mobile http://www.hp.com/go/iPAQ http://hp.com/sbso/wireless/index.html MSN Mobile http://www.mobile.msn.com/pocketpc Call to action www.hp.com http://welcome.hp.com/country/us/en/support.html www.hp subject to change without notice. The only warranties for HP products and services are set
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

HP iPAQ Handheld Security Solutions
Overview
..........................................................................................................................................................
2
Security
........................................................................................................................................................
2
HP ProtectTools
...............................................................................................................................................
3
Using HP ProtectTools
.................................................................................................................................
3
Odyssey Client
.................................................................................................................................................
3
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)
...........................................................................
4
Special issues related to security
.....................................................................................................................
4
Recovering from a locked device
.................................................................................................................
5
Passphrases
................................................................................................................................................
5
Performance considerations related to data encryption
...............................................................................
5
Network Connections
.......................................................................................................................................
6
Virtual Private Network and Wired Equivalency Privacy
..............................................................................
6
Wi-Fi Protected Access (WPA) and TKIP/AES
................................................................................................
6
Wireless fidelity (Wi-Fi)
................................................................................................................................
7
Wi-Fi hotspots
..............................................................................................................................................
7
WLAN standards
..........................................................................................................................................
7
Additional Security Solutions
...........................................................................................................................
8
Terminology
.....................................................................................................................................................
9
For more information
......................................................................................................................................
10
Call to action
..................................................................................................................................................
10