HP 8530p HP ProtectTools - Windows Vista and Windows XP - Page 12

Achieving key security objectives, Protecting against targeted theft - review

Page 12 highlights

Achieving key security objectives The HP ProtectTools modules can work together to provide solutions for a variety of security issues, including the following key security objectives: ● Protecting against targeted theft ● Restricting access to sensitive data ● Preventing unauthorized access from internal or external locations ● Creating strong password policies ● Addressing regulatory security mandates Protecting against targeted theft An example of this type of incident would be the targeted theft of a computer containing confidential data and customer information at an airport security checkpoint. The following features help protect against targeted theft: ● The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See the following procedures: ◦ Credential Manager ◦ Embedded Security ◦ Drive Encryption ● DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and installed into an unsecured system. ● The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools module, encrypts sensitive data to help ensure it cannot be accessed without authentication. See the following procedures: ◦ Embedded Security "Setup procedures on page 69" ◦ "Using the Personal Secure Drive on page 71" Restricting access to sensitive data Suppose a contract auditor is working onsite and has been given computer access to review sensitive financial data; you do not want the auditor to be able to print the files or save them to a writeable device such as a CD. The following features help restrict access to data: ● Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable devices so sensitive information cannot be printed or copied from the hard drive onto removable media. See "Device class configuration (advanced) on page 77." ● DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and installed into an unsecured system. Preventing unauthorized access from internal or external locations Unauthorized access to an unsecured business PC presents a very tangible risk to corporate network resources such as information from financial services, an executive, or R&D team, and to private 6 Chapter 1 Introduction to security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106

Achieving key security objectives
The HP ProtectTools modules can work together to provide solutions for a variety of security issues,
including the following key security objectives:
Protecting against targeted theft
Restricting access to sensitive data
Preventing unauthorized access from internal or external locations
Creating strong password policies
Addressing regulatory security mandates
Protecting against targeted theft
An example of this type of incident would be the targeted theft of a computer containing confidential
data and customer information at an airport security checkpoint. The following features help protect
against targeted theft:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See
the following procedures:
Credential Manager
Embedded Security
Drive Encryption
DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and
installed into an unsecured system.
The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools
module, encrypts sensitive data to help ensure it cannot be accessed without authentication. See
the following procedures:
Embedded Security “
Setup procedures
on page
69
Using the Personal Secure Drive
on page
71
Restricting access to sensitive data
Suppose a contract auditor is working onsite and has been given computer access to review sensitive
financial data; you do not want the auditor to be able to print the files or save them to a writeable device
such as a CD. The following features help restrict access to data:
Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable
devices so sensitive information cannot be printed or copied from the hard drive onto removable
media. See “
Device class configuration (advanced)
on page
77
.”
DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and
installed into an unsecured system.
Preventing unauthorized access from internal or external locations
Unauthorized access to an unsecured business PC presents a very tangible risk to corporate network
resources such as information from financial services, an executive, or R&D team, and to private
6
Chapter 1
Introduction to security