Compaq nc8000 HP ProtectTools: Authentication technologies and suitability to
Compaq nc8000 - Notebook PC Manual
View all Compaq nc8000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Compaq nc8000 manual content summary:
- Compaq nc8000 | HP ProtectTools: Authentication technologies and suitability to - Page 1
: Authentication technologies and suitability to task Introduction...2 Authentication technologies in HP ProtectTools 2 Password authentication ...3 TPM embedded security chip authentication 4 Smart card authentication ...4 USB token authentication ...5 Biometric fingerprint authentication - Compaq nc8000 | HP ProtectTools: Authentication technologies and suitability to - Page 2
and suitability to task. Authentication technologies in HP ProtectTools HP client PCs support a breadth of authentication devices in the Microsoft® Windows® operating system environment, as well as the pre-boot environment. This breadth of support for authentication devices gives customers a range - Compaq nc8000 | HP ProtectTools: Authentication technologies and suitability to - Page 3
can be seen by someone else. Even strong and carefully protected passwords can be compromised via contact with keyboard monitoring viruses or other forms of commonly used network attacks. To compound the problem, a compromised password can go undetected, which means timely steps cannot be taken to - Compaq nc8000 | HP ProtectTools: Authentication technologies and suitability to - Page 4
authentication device, HP has enabled user authentication using the TPM. HP ProtectTools technology boot user authentication allows an administrator to set a pre-boot user authentication policy utilizing the TPM and the user's TPM basic user key password. When such a policy is enabled, the BIOS - Compaq nc8000 | HP ProtectTools: Authentication technologies and suitability to - Page 5
guessed. Unlike passwords, loss of smart cards can be detected and steps can be taken to prevent access to the system and the network. Smart Key Infrastructure (PKI) deployments in a corporation, and provide functionality such email signing and data encryption. Note: In addition to PKI support, HP - Compaq nc8000 | HP ProtectTools: Authentication technologies and suitability to - Page 6
to PKI support, HP ProtectTools also provides the means to more securely store user authentication credentials like passwords and therefore does should be used in combination with other technologies. 3 While network authentication for biometrics can be implemented, the flexibility would be limited - Compaq nc8000 | HP ProtectTools: Authentication technologies and suitability to - Page 7
ProtectTools Security on HP Client PC's with each of the authentication technologies discussed. Functionality Password TPM Requires multiple traits for No No authentication4 Pre-boot Authentication on HP Yes Yes clients 5 Drivelock protection on HP Yes Yes clients 6 Windows Logon via - Compaq nc8000 | HP ProtectTools: Authentication technologies and suitability to - Page 8
) Hardware Token (Smartcard, USB) with PKI TPM Hardware Token (Smartcard USB) with Stored PIN Two factor (Biometric and Strong Password) Strong Password Biometric (Enterprise) Biometrics (Local) Weak Password Simple Administrative Complexity Complex Single-Factor Authentication Less Secure 8 - Compaq nc8000 | HP ProtectTools: Authentication technologies and suitability to - Page 9
express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Microsoft and Windows are U.S. registered trademarks of Microsoft
HP ProtectTools:
Authentication technologies and suitability to task
Introduction
.........................................................................................................................................
2
Authentication technologies in HP ProtectTools
........................................................................................
2
Password authentication
.......................................................................................................................
3
TPM embedded security chip authentication
............................................................................................
4
Smart card authentication
.....................................................................................................................
4
USB token authentication
......................................................................................................................
5
Biometric fingerprint authentication
........................................................................................................
6
Virtual token authentication
...................................................................................................................
7
Feature Comparison and suitability to task
..............................................................................................
7
Suitability to Task
.................................................................................................................................
8
Conclusion
..........................................................................................................................................
9
For more information
............................................................................................................................
9