File And Folder Encryption - Asus F2F Hardware User Manual

Hide thumbs Also See for F2F:
Table of Contents

Advertisement

A
Appendix
ASUS Security Protect Manager
ASUS Security Protect Manager and Single Sign-
On is designed to be secure and easy to use. ASUS
Security Protect Manager provides enhanced pro-
tection for the Notebook PC, user data, and user
credentials. Automatic application registration,
wizards, and predefined applications make it easy to
record new applications and credentials. End-to-end
security built on consistent, solid, and manageable
platforms.
Reasons for Notebook PC security
• Data protection.
• User & device authentication.
• Commercial Notebook PC security strategy.
• Security attacks trace back to key elements in the enterprise.
ASUS Security Protect Manager focus areas
• Password security
• Password manager
• End-user ease-of-use
• Single sign-on convenience
• Multifactor authentication
• Embedded security (TPM module)
• Fingerprint replace password entries
• Hardware-based security protects data and credentials
• Fingerprint authentication linked with Windows security
• Easy access to security features and application configuration

File and folder encryption

Embedded security chip securely stores master keys on its own hardware (not on the Notebook PC) to
help encrypt and decrypt files and folders on the hard drive. Encryption of files and folders are transpar-
ent to users, encrypted folders are not visible to other users, and access to encrypted files by Windows is
the same as standard files. Email and data encryption compatible with MS Outlook, MS Exchange, MS
Internet Explorer, and Lotus Notes. Data encryption for network shared folders.
Customer benefits
ASUS Security Protect Manager enables IT managers to manage their security solutions in a simple,
easy to use manner and further protect end user's data, credentials. Also increase the convenience for
password entry.
60

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

F2hfF2j

Table of Contents