This paper is meant to be an overview only of the LE1600 security features for Motion customers or prospective customers. It is not meant to be a guide for implementing these features or for designing a corporate security policy.
the security policies step so that improvements and changes can be made as attacks and vulnerabilities change. Assess Develop Risk Policy Report and Implement Audit Technology Areas of Vulnerability When assessing an organization’s or platform’s risk, there are four areas of vulnerability. These areas are access control, application and data protection, client hardware protection, and network protection.
Page 4
Access Control Access control is the process by which users are identified and granted privileges to information, systems or resources. Controlling how privileges are granted and how resources are accessed is critical to protecting private and confidential information from unauthorized users. Access control technologies properly identify people and verify their identity through an authentication process so they can be held accountable for their actions.
Layers of Security Within each of the areas of vulnerability there are several security technologies and techniques available to harden the system. No technology by itself will completely protect a client or an organization. Instead, multiple technologies should be used together to increase the protection of a system.
Motion LE1600 Security Features The Motion Tablet PC has several security mechanisms built-in and ready to go for out-of-the-box protection. They can be enabled using the pre-installed software applications, by developing or using your own applications, or by installing a third-party application. Most of the built-in security technologies have software development kits available for custom development.
The hardware cable locks are widely available from manufacturers such as Kensington and Targus. LE1600 Security Lock Slot Motion Security Center The Motion Security Center is a launch pad for the different security applications preinstalled on the Motion Tablet PC.
Windows EFS can use any of the Windows Cryptographic Service Providers (CSPs) available on the system. Those CSPs enable encryption algorithms with keys lengths from 40 – 128 bits. Motion LE1600 Add-on Security Features There are several add on security features available for the Motion Tablet PC.
or inking) on a PDA or digitizer, which is statistically compared to a previously established template for the sign. Learn more > http://www.crypto-sign.com/ IdentityMine, Inc. IdentityMine is a professional services organization specializing in delivering business value through the strategic use of information technology. IdentityMine’s Tablet PC solutions include a Windows-powered SmartClient application for the insurance industry, among other solutions developed for Microsoft, Hewlett-Packard, Google, and Accede Networks.
Need help?
Do you have a question about the LE1600 and is the answer not in the manual?
Questions and answers