Hp Protecttools Security Products Description And Common Use Examples; Credential Manager (Password Manager) For Hp Protecttools - HP Compaq Elite 8200 AIO User Manual

Security software
Table of Contents

Advertisement

Module
Smart Card Security (part of Security Manager)
Embedded Security for HP ProtectTools
Device Access Manager for HP ProtectTools
Computrace for HP ProtectTools
HP ProtectTools security products description and
common use examples
Most of the HP ProtectTools security products have both a user authentication (usually a password)
and an administrative backup to gain access if passwords are lost, not available, forgotten, or any
time corporate security requires access.
NOTE:
Some of the HP ProtectTools security products are designed to restrict access to data. Data
should be encrypted when it is so important that the user would rather lose the information then have
it compromised. It is recommended that all data be backed up in a secure location.

Credential Manager (Password Manager) for HP ProtectTools

Credential Manager (part of Security Manager) is a repository for user names and passwords. It is
most often used to save login names and passwords for Internet access or web mail. Credential
Manager can automatically log the user into a web site or mail.
ENWW
Key features

HP ProtectTools security products description and common use examples

Provides a management software interface for Smart Card.
HP ProtectTools Smart Card is a personal security device that
protects authentication data requiring both the card and a PIN
number to grant access. The Smart Card can be used to access
Password Manager, Drive Encryption, or any number of third
party access points.
Change PIN number.
Uses a Trusted Platform Module (TPM) embedded security chip
(if equipped) to help protect against unauthorized access to
sensitive user data or credentials stored locally on a PC.
Allows creation of a personal secure drive (PSD), which is
useful in protecting user file and folder information.
Supports third-party applications (such as Microsoft Outlook and
Internet Explorer) for protected digital certificate operations.
Allows IT managers or administrators to control access to
devices such as USB ports, optical drives, personal music
players, etc. based on user profiles.
Prevents unauthorized users from removing data using external
storage media and from introducing viruses into the system from
external media.
The administrator can disable access to writeable devices for
specific individuals or groups of users.
Allows the administrator to schedule when access is provided to
hardware.
Provides secure asset tracking.
Can monitor user activity along with hardware and software
changes.
Remains active even if the hard drive is reformatted or replaced.
Requires separate purchase of tracking and tracing subscription
to activate.
3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents