HP iPAQ 912c HP iPAQ Security Solutions

HP iPAQ 912c - Business Messenger Manual

HP iPAQ 912c manual content summary:

  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 1
    Handheld Security Solutions Overview ...2 Security ...2 HP ProtectTools...3 Using HP ProtectTools...3 Odyssey Client...3 Biometric Fingerprint Reader (HP iPAQ hx2700 series only 4 Special issues related to security...4 Recovering from a locked device...5 Passphrases ...5 Performance considerations
  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 2
    . Odyssey Client supports networks that adhere to the 802.11b wireless LAN standards. These networks can be found in hotels, airports, and other Internet hotspots. • A special Biometric Fingerprint Reader allows users to easily login with a swipe of the finger (HP iPAQ hx2700 series Pocket PC only
  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 3
    ® (CMG) provides solutions that reduce specific security risks to handheld users. These security solutions provide certain advantages that allow you to protect your device more effectively. The first layer of security involves PIN or password access for HP iPAQ devices. A second layer of defense
  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 4
    be remembered like a password or PIN. You can also find more specific information about how to enroll fingerprints using HP ProtectTools in the User's Guide on the Companion CD. (If you purchased an HP iPAQ hx2700 Pocket PC, the Companion CD is available with your device.) Special issues related to
  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 5
    hard or clean reset, and all memory will be set back to the default factory condition which includes deleting data in the iPAQ File Store. If this option is chosen, the iPAQ , so you are able to perform other tasks on your HP iPAQ during this time. There are two methods to monitor the decryption process
  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 6
    devices. WEP is intended to provide wireless users with the same level of privacy as users in a wired network environment. Public specific instructions on how to create, change, and start a VPN connection using your HP iPAQ, refer to the documentation that came with your device. To get specific
  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 7
    tasks such as allowing sales people to access customer Wi-Fi hotspots enable users to access Internet on their business or home PCs. Before trying to connect to a wireless came with your HP iPAQ. WLAN standards IEEE Fi network operates in the 5-Ghz frequency band and can transfer data at a maximum
  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 8
    can download a free 30-day trial version of the software. Pointsec® for Pocket PC provides convenient, real-time encryption of information on mobile devices as well as external storage cards. User-information is automatically encrypted and stored on your device. Pointsec for Pocket PCs is a pictured
  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 9
    specification for case sensitive.). Improved data encryption for WPA. TKIP provides stronger encryption than WEP. A way of providing users (for example, remote offices, telecommuters, etc.) secure access to their organization's network by way of the Internet. Physical hardware or computer software
  • HP iPAQ 912c | HP iPAQ Security Solutions - Page 10
    For more information iPAQ Mobile http://www.hp.com/go/iPAQ http://hp.com/sbso/wireless/index.html MSN Mobile http://www.mobile.msn.com/pocketpc Call to action www.hp.com http://welcome.hp.com/country/us/en/support.html www.hp.com/sbso/wireless/secure_wlan_mobile.pdf www.bluefiresecurity.com www.funk
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

HP iPAQ Handheld Security Solutions
Overview
..........................................................................................................................................................
2
Security
........................................................................................................................................................
2
HP ProtectTools
...............................................................................................................................................
3
Using HP ProtectTools
.................................................................................................................................
3
Odyssey Client
.................................................................................................................................................
3
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)
...........................................................................
4
Special issues related to security
.....................................................................................................................
4
Recovering from a locked device
.................................................................................................................
5
Passphrases
................................................................................................................................................
5
Performance considerations related to data encryption
...............................................................................
5
Network Connections
.......................................................................................................................................
6
Virtual Private Network and Wired Equivalency Privacy
..............................................................................
6
Wi-Fi Protected Access (WPA) and TKIP/AES
................................................................................................
6
Wireless fidelity (Wi-Fi)
................................................................................................................................
7
Wi-Fi hotspots
..............................................................................................................................................
7
WLAN standards
..........................................................................................................................................
7
Additional Security Solutions
...........................................................................................................................
8
Terminology
.....................................................................................................................................................
9
For more information
......................................................................................................................................
10
Call to action
..................................................................................................................................................
10