HP iPAQ h2200 HP iPAQ Security Solutions

HP iPAQ h2200 - Pocket PC Manual

HP iPAQ h2200 manual content summary:

  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 1
    Handheld Security Solutions Overview ...2 Security ...2 HP ProtectTools...3 Using HP ProtectTools...3 Odyssey Client...3 Biometric Fingerprint Reader (HP iPAQ hx2700 series only 4 Special issues related to security...4 Recovering from a locked device...5 Passphrases ...5 Performance considerations
  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 2
    . Odyssey Client supports networks that adhere to the 802.11b wireless LAN standards. These networks can be found in hotels, airports, and other Internet hotspots. • A special Biometric Fingerprint Reader allows users to easily login with a swipe of the finger (HP iPAQ hx2700 series Pocket PC only
  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 3
    ® (CMG) provides solutions that reduce specific security risks to handheld users. These security solutions provide certain advantages that allow you to protect your device more effectively. The first layer of security involves PIN or password access for HP iPAQ devices. A second layer of defense
  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 4
    Client software onto your HP iPAQ. For instructions on installing specific information about how to enroll fingerprints using HP ProtectTools in the User's Guide on the Companion CD. (If you purchased an HP iPAQ hx2700 Pocket PC hard reset" that will wipe out all of the data on the unit. The "hard reset
  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 5
    reset, and all memory will be set back to the default factory condition which includes deleting data in the iPAQ File Store. If this option is chosen, the iPAQ File Store takes more than 10 minutes to initialize. During this initialization process, it is recommended that you connect your HP iPAQ
  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 6
    key length is extended to 256 bits for encryption. To obtain device-specific instructions on how to create, change, and start a VPN connection using your HP iPAQ, refer to the documentation that came with your device. To get specific information about turning on or off WLAN and Wi-Fi, refer to
  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 7
    they would otherwise perform on their business or home PCs. Before trying to connect to a wireless network at charge their customers a fee for this service. Convenience and increased productivity make Wi-Fi Getting Started CD that came with your HP iPAQ. WLAN standards IEEE wireless standards such
  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 8
    or wireless Ethernet networks. This standard does not define any specific security protocol, but is based on EAP types documented and ratified com, Windows Mobile 2003 and Windows Mobile 5.0 users can download a free 30-day trial version of the software. Pointsec® for Pocket PC provides convenient
  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 9
    IEEE 802.1x SSID Service Set Identifier TKIP/AES Area Definition The standard specification for wireless local area maximum number of 32 characters and is case sensitive.). Improved data encryption for WPA. of the Internet. Physical hardware or computer software that acts as a hub for users of
  • HP iPAQ h2200 | HP iPAQ Security Solutions - Page 10
    /atwork/default.mspx www.pointsec.com www.zonelabs.com © 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

HP iPAQ Handheld Security Solutions
Overview
..........................................................................................................................................................
2
Security
........................................................................................................................................................
2
HP ProtectTools
...............................................................................................................................................
3
Using HP ProtectTools
.................................................................................................................................
3
Odyssey Client
.................................................................................................................................................
3
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)
...........................................................................
4
Special issues related to security
.....................................................................................................................
4
Recovering from a locked device
.................................................................................................................
5
Passphrases
................................................................................................................................................
5
Performance considerations related to data encryption
...............................................................................
5
Network Connections
.......................................................................................................................................
6
Virtual Private Network and Wired Equivalency Privacy
..............................................................................
6
Wi-Fi Protected Access (WPA) and TKIP/AES
................................................................................................
6
Wireless fidelity (Wi-Fi)
................................................................................................................................
7
Wi-Fi hotspots
..............................................................................................................................................
7
WLAN standards
..........................................................................................................................................
7
Additional Security Solutions
...........................................................................................................................
8
Terminology
.....................................................................................................................................................
9
For more information
......................................................................................................................................
10
Call to action
..................................................................................................................................................
10