Motion Computing LE1600 White Paper

Motion Computing LE1600 White Paper

Motion computing le1600: supplementary guide
Hide thumbs Also See for LE1600:

Advertisement

Customer Whitepaper
Motion™ Tablet PC Security Basics

Table of Contents

Whitepaper Goals and Intended Audience ...........................................................2
Security for your Motion Tablet PC .......................................................................2
Thinking about Security ........................................................................................2
Areas of Vulnerability ............................................................................................3
Layers of Security .................................................................................................5
Motion LE1600 Security Features.........................................................................6
Motion LE1600 Encryption Tools ..........................................................................7
Motion LE1600 Add-on Security Features ............................................................8
Conclusion ............................................................................................................9
Customer Whitepaper: Motion Tablet PC Security Basics, Rev A03
Page 1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LE1600 and is the answer not in the manual?

Questions and answers

Summary of Contents for Motion Computing LE1600

  • Page 1: Table Of Contents

    Thinking about Security ...2 Areas of Vulnerability ...3 Layers of Security ...5 Motion LE1600 Security Features...6 Motion LE1600 Encryption Tools ...7 Motion LE1600 Add-on Security Features ...8 Conclusion ...9 Customer Whitepaper: Motion Tablet PC Security Basics, Rev A03 Page 1...
  • Page 2: Whitepaper Goals And Intended Audience

    This paper is meant to be an overview only of the LE1600 security features for Motion customers or prospective customers. It is not meant to be a guide for implementing these features or for designing a corporate security policy.
  • Page 3: Areas Of Vulnerability

    the security policies step so that improvements and changes can be made as attacks and vulnerabilities change. Assess Develop Risk Policy Report and Implement Audit Technology Areas of Vulnerability When assessing an organization’s or platform’s risk, there are four areas of vulnerability. These areas are access control, application and data protection, client hardware protection, and network protection.
  • Page 4 Access Control Access control is the process by which users are identified and granted privileges to information, systems or resources. Controlling how privileges are granted and how resources are accessed is critical to protecting private and confidential information from unauthorized users. Access control technologies properly identify people and verify their identity through an authentication process so they can be held accountable for their actions.
  • Page 5: Layers Of Security

    Layers of Security Within each of the areas of vulnerability there are several security technologies and techniques available to harden the system. No technology by itself will completely protect a client or an organization. Instead, multiple technologies should be used together to increase the protection of a system.
  • Page 6: Motion Le1600 Security Features

    Motion LE1600 Security Features The Motion Tablet PC has several security mechanisms built-in and ready to go for out-of-the-box protection. They can be enabled using the pre-installed software applications, by developing or using your own applications, or by installing a third-party application. Most of the built-in security technologies have software development kits available for custom development.
  • Page 7: Motion Le1600 Encryption Tools

    The hardware cable locks are widely available from manufacturers such as Kensington and Targus. LE1600 Security Lock Slot Motion Security Center The Motion Security Center is a launch pad for the different security applications preinstalled on the Motion Tablet PC.
  • Page 8: Motion Le1600 Add-On Security Features

    Windows EFS can use any of the Windows Cryptographic Service Providers (CSPs) available on the system. Those CSPs enable encryption algorithms with keys lengths from 40 – 128 bits. Motion LE1600 Add-on Security Features There are several add on security features available for the Motion Tablet PC.
  • Page 9: Conclusion

    or inking) on a PDA or digitizer, which is statistically compared to a previously established template for the sign. Learn more > http://www.crypto-sign.com/ IdentityMine, Inc. IdentityMine is a professional services organization specializing in delivering business value through the strategic use of information technology. IdentityMine’s Tablet PC solutions include a Windows-powered SmartClient application for the insurance industry, among other solutions developed for Microsoft, Hewlett-Packard, Google, and Accede Networks.

Table of Contents