HP ProBook 4535s HP ProtectTools Getting Started - Windows 7 and Windows Vista - Page 15

second computer to have the necessary encryption keys to decrypt the data. During the transport

Page 15 highlights

resist password attacks where someone would attempt to guess the decryption password. Embedded Security can also encrypt the entire drive and e-mail. Example 2: A stock broker wants to transport extremely sensitive data to another computer using a portable drive. She wants to make sure that only these two computers can open the drive, even if the password is compromised. The stock broker uses Embedded Security TPM migration to allow a second computer to have the necessary encryption keys to decrypt the data. During the transport process, even with the password, only the two physical computers can decrypt the data. HP ProtectTools security product description and common use examples 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124

resist password attacks where someone would attempt to guess the decryption password. Embedded
Security can also encrypt the entire drive and e-mail.
Example 2:
A stock broker wants to transport extremely sensitive data to another computer using a
portable drive. She wants to make sure that only these two computers can open the drive, even if the
password is compromised. The stock broker uses Embedded Security TPM migration to allow a
second computer to have the necessary encryption keys to decrypt the data. During the transport
process, even with the password, only the two physical computers can decrypt the data.
HP ProtectTools security product description and common use examples
7