HP EliteBook 8470p HP ProtectTools Getting Started - Page 17

Achieving key security objectives, Protecting against targeted theft - 3 monitors

Page 17 highlights

Example 2: A real estate company needs to manage and update computers all over the world. They use Computrace to monitor and update the computers without having to send an IT person to each computer. Achieving key security objectives The HP ProtectTools modules can work together to provide solutions for a variety of security issues, including the following key security objectives: ● Protecting against targeted theft ● Restricting access to sensitive data ● Preventing unauthorized access from internal or external locations ● Creating strong password policies Protecting against targeted theft An example of targeted theft would be the theft of a computer containing confidential data and customer information at an airport security checkpoint. The following features help protect against targeted theft: ● The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See the following chapters: ◦ Security Manager for HP ProtectTools-See HP ProtectTools Security Manager on page 33. ◦ Embedded Security for HP ProtectTools-See Embedded Security for HP ProtectTools (select models only) on page 103. ◦ Drive Encryption for HP ProtectTools-See Drive Encryption for HP ProtectTools (select models only) on page 53. ● Encryption helps ensure that data cannot be accessed even if the hard drive is removed and installed into an unsecured system. ● The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools module, encrypts sensitive data to help ensure that it cannot be accessed without authentication. See the following chapter: ◦ Embedded Security for HP ProtectTools-See Embedded Security for HP ProtectTools (select models only) on page 103. ● Computrace can track the computer's location after a theft. See the following chapter: ◦ Computrace for HP ProtectTools-See Theft recovery (select models only) on page 101. Achieving key security objectives 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

Example 2:
A real estate company needs to manage and update computers all over the world. They
use Computrace to monitor and update the computers without having to send an IT person to each
computer.
Achieving key security objectives
The HP ProtectTools modules can work together to provide solutions for a variety of security issues,
including the following key security objectives:
Protecting against targeted theft
Restricting access to sensitive data
Preventing unauthorized access from internal or external locations
Creating strong password policies
Protecting against targeted theft
An example of targeted theft would be the theft of a computer containing confidential data and
customer information at an airport security checkpoint. The following features help protect against
targeted theft:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system.
See the following chapters:
Security Manager for HP ProtectTools—See
HP ProtectTools Security Manager
on page
33
.
Embedded Security for HP ProtectTools—See
Embedded Security for HP ProtectTools
(select models only)
on page
103
.
Drive Encryption for HP ProtectTools—See
Drive Encryption for HP ProtectTools (select
models only)
on page
53
.
Encryption helps ensure that data cannot be accessed even if the hard drive is removed and
installed into an unsecured system.
The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools
module, encrypts sensitive data to help ensure that it cannot be accessed without authentication.
See the following chapter:
Embedded Security for HP ProtectTools—See
Embedded Security for HP ProtectTools
(select models only)
on page
103
.
Computrace can track the computer's location after a theft. See the following chapter:
Computrace for HP ProtectTools—See
Theft recovery (select models only)
on page
101
.
Achieving key security objectives
7