HP EliteBook 8470p HP ProtectTools Getting Started - Page 16

Device Access Manager for HP ProtectTools (select models only) - ports

Page 16 highlights

Device Access Manager for HP ProtectTools (select models only) Device Access Manager for HP ProtectTools allows an administrator to restrict and manage access to hardware. Device Access Manager for HP ProtectTools can be used to block unauthorized access to USB flash drives where data could be copied. It can also restrict access to CD/DVD drives, control of USB devices, network connections, and so on. An example would be a situation where outside vendors need access to company computers but should not be able to copy the data to a USB drive. Example 1: A manager of a medical supply company often works with personal medical records along with his company information. The employees need access to this data, however, it is extremely important that the data is not removed from the computer by a USB drive or any other external storage media. The network is secure, but the computers have CD burners and USB ports that could allow the data to be copied or stolen. The Manager uses Device Access Manager to disable the USB ports and CD burners so they cannot be used. Even though the USB ports are blocked, mouse and keyboards will continue to function. Example 2: An insurance company does not want its employees to install or load personal software or data from home. Some employees need access to the USB port on all computers. The IT manager uses Device Access Manager to enable access for some employees while blocking external access for others. Privacy Manager for HP ProtectTools (select models only) Privacy Manager for HP ProtectTools is used when Internet email communications need to be secured. The user can create and send email that can only be opened by an authenticated recipient. With Privacy Manager, the information cannot be compromised or intercepted by an imposter. Example 1: A stock broker wants to make sure that his emails only go to specific clients and that no one can fake the email account and intercept it. The stock broker signs himself and his clients up with Privacy Manager. Privacy Manager issues them a Certificate of Authentication (CA) to each user. Using this tool, the stock broker and his clients must authenticate before the email is exchanged. Privacy Manager for HP ProtectTools makes it easy to send and receive email where the recipient has been verified and authenticated. The mail service can also be encrypted. The encryption process is similar to the one used during general credit card purchases on the Internet. Example 2: A CEO wants to ensure that only the members of the board of directors can view the information he sends through email. The CEO uses the option to encrypt the email sent and received from the directors. A Privacy Manager Certificate of Authentication allows the CEO and directors to have a copy of the encryption key so only they can decrypt the confidential email. Computrace for HP ProtectTools (formerly LoJack Pro) (purchased separately) Computrace for HP ProtectTools (purchased separately) is a service that can track the location of a stolen computer whenever the user accesses the Internet. Example 1: A school principal instructed the IT department to keep track of all the computers at his school. After the inventory of the computers was made, the IT administrator registered all the computers with Computrace so they could be traced in case they were ever stolen. Recently, the school realized several computers were missing, so the IT administrator alerted the authorities and Computrace officials. The computers were located and were returned to the school by the authorities. Computrace for HP ProtectTools can also help remotely manage and locate computers, as well as monitor computer usage and applications. 6 Chapter 1 Introduction to security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

Device Access Manager for HP ProtectTools (select models only)
Device Access Manager for HP ProtectTools allows an administrator to restrict and manage access
to hardware. Device Access Manager for HP ProtectTools can be used to block unauthorized access
to USB flash drives where data could be copied. It can also restrict access to CD/DVD drives, control
of USB devices, network connections, and so on. An example would be a situation where outside
vendors need access to company computers but should not be able to copy the data to a USB drive.
Example 1:
A manager of a medical supply company often works with personal medical records
along with his company information. The employees need access to this data, however, it is
extremely important that the data is not removed from the computer by a USB drive or any other
external storage media. The network is secure, but the computers have CD burners and USB ports
that could allow the data to be copied or stolen. The Manager uses Device Access Manager to
disable the USB ports and CD burners so they cannot be used. Even though the USB ports are
blocked, mouse and keyboards will continue to function.
Example 2:
An insurance company does not want its employees to install or load personal software
or data from home. Some employees need access to the USB port on all computers. The IT manager
uses Device Access Manager to enable access for some employees while blocking external access
for others.
Privacy Manager for HP ProtectTools (select models only)
Privacy Manager for HP ProtectTools is used when Internet email communications need to be
secured. The user can create and send email that can only be opened by an authenticated recipient.
With Privacy Manager, the information cannot be compromised or intercepted by an imposter.
Example 1:
A stock broker wants to make sure that his emails only go to specific clients and that no
one can fake the email account and intercept it. The stock broker signs himself and his clients up with
Privacy Manager. Privacy Manager issues them a Certificate of Authentication (CA) to each user.
Using this tool, the stock broker and his clients must authenticate before the email is exchanged.
Privacy Manager for HP ProtectTools makes it easy to send and receive email where the recipient
has been verified and authenticated. The mail service can also be encrypted. The encryption process
is similar to the one used during general credit card purchases on the Internet.
Example 2:
A CEO wants to ensure that only the members of the board of directors can view the
information he sends through email. The CEO uses the option to encrypt the email sent and received
from the directors. A Privacy Manager Certificate of Authentication allows the CEO and directors to
have a copy of the encryption key so only they can decrypt the confidential email.
Computrace for HP ProtectTools (formerly LoJack Pro) (purchased
separately)
Computrace for HP ProtectTools (purchased separately) is a service that can track the location of a
stolen computer whenever the user accesses the Internet.
Example 1:
A school principal instructed the IT department to keep track of all the computers at his
school. After the inventory of the computers was made, the IT administrator registered all the
computers with Computrace so they could be traced in case they were ever stolen. Recently, the
school realized several computers were missing, so the IT administrator alerted the authorities and
Computrace officials. The computers were located and were returned to the school by the authorities.
Computrace for HP ProtectTools can also help remotely manage and locate computers, as well as
monitor computer usage and applications.
6
Chapter 1
Introduction to security