HP ProBook 4540s HP ProtectTools Getting Started - Page 18

Restricting access to sensitive data - review

Page 18 highlights

Restricting access to sensitive data Suppose a contract auditor is working onsite and has been given computer access to review sensitive financial data; you do not want the auditor to be able to print the files or save them to a writable device such as a CD. The following feature helps restrict access to data: ● Device Access Manager for HP ProtectTools allows IT managers to restrict access to communication devices so that sensitive information cannot be copied from the hard drive. See Device Class Configuration on page 91. Preventing unauthorized access from internal or external locations Unauthorized access to an unsecured business computer presents a very real risk to corporate network resources such as information from financial services, an executive, or the R&D team, and to private information such as patient records or personal financial records. The following features help prevent unauthorized access: ● The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See the following chapters: ◦ Security Manager for HP ProtectTools-See HP ProtectTools Security Manager on page 33. ◦ Embedded Security for HP ProtectTools-See Embedded Security for HP ProtectTools (select models only) on page 103. ◦ Drive Encryption for HP ProtectTools-See Drive Encryption for HP ProtectTools (select models only) on page 53. ● Security Manager helps ensure that an unauthorized user cannot get passwords or access to password-protected applications. See HP ProtectTools Security Manager on page 33. ● Device Access Manager for HP ProtectTools allows IT managers to restrict access to writable devices so sensitive information cannot be copied from the hard drive. See Device Access Manager for HP ProtectTools (select models only) on page 89. ● File Sanitizer (select models only) allows secure deletion of data by shredding critical files and folders or bleaching deleted assets on the hard drive (writing over data that has been deleted but is still recoverable). See File Sanitizer for HP ProtectTools (select models only) on page 81. ● Privacy Manager allows you to obtain Privacy Manager Certificates when using email or Microsoft Office documents, making the process of sending and saving important information safe and secure. See Privacy Manager for HP ProtectTools (select models only) on page 65. Creating strong password policies If a company policy goes into effect that requires the use of strong password policy for dozens of Web-based applications and databases, Security Manager provides a protected repository for passwords and Single Sign On convenience. See HP ProtectTools Security Manager on page 33. 8 Chapter 1 Introduction to security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

Restricting access to sensitive data
Suppose a contract auditor is working onsite and has been given computer access to review sensitive
financial data; you do not want the auditor to be able to print the files or save them to a writable
device such as a CD. The following feature helps restrict access to data:
Device Access Manager for HP ProtectTools allows IT managers to restrict access to
communication devices so that sensitive information cannot be copied from the hard drive. See
Device Class Configuration
on page
91
.
Preventing unauthorized access from internal or external locations
Unauthorized access to an unsecured business computer presents a very real risk to corporate
network resources such as information from financial services, an executive, or the R&D team, and to
private information such as patient records or personal financial records. The following features help
prevent unauthorized access:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system.
See the following chapters:
Security Manager for HP ProtectTools—See
HP ProtectTools Security Manager
on page
33
.
Embedded Security for HP ProtectTools—See
Embedded Security for HP ProtectTools
(select models only)
on page
103
.
Drive Encryption for HP ProtectTools—See
Drive Encryption for HP ProtectTools (select
models only)
on page
53
.
Security Manager helps ensure that an unauthorized user cannot get passwords or access to
password-protected applications. See
HP ProtectTools Security Manager
on page
33
.
Device Access Manager for HP ProtectTools allows IT managers to restrict access to writable
devices so sensitive information cannot be copied from the hard drive. See
Device Access
Manager for HP ProtectTools (select models only)
on page
89
.
File Sanitizer (select models only) allows secure deletion of data by shredding critical files and
folders or bleaching deleted assets on the hard drive (writing over data that has been deleted but
is still recoverable). See
File Sanitizer for HP ProtectTools (select models only)
on page
81
.
Privacy Manager allows you to obtain Privacy Manager Certificates when using email or
Microsoft Office documents, making the process of sending and saving important information
safe and secure. See
Privacy Manager for HP ProtectTools (select models only)
on page
65
.
Creating strong password policies
If a company policy goes into effect that requires the use of strong password policy for dozens of
Web-based applications and databases, Security Manager provides a protected repository for
passwords and Single Sign On convenience. See
HP ProtectTools Security Manager
on page
33
.
8
Chapter 1
Introduction to security