Conclusion; For More Information - HP Compaq NC4010 Security Manual

Authentication technologies and suitability to task
Hide thumbs Also See for Compaq NC4010:
Table of Contents

Advertisement

Conclusion

All authentication technologies provide a level of protection against unauthorized access. The
determining tradeoffs are level of security, cost, and usability.
In making a decision on which authentication technology to deploy, all three factors should be taken
into consideration. It is important that the selected technology provide the level of protection
appropriate for an environment. It is also important that the selected technology be usable and not
result in user dissatisfaction.

For more information

www.hp.com
www.hp.com/products/security
© 2005 Hewlett-Packard Development Company, L.P. The information contained
herein is subject to change without notice. The only warranties for HP products and
services are set forth in the express warranty statements accompanying such products
and services. Nothing herein should be construed as constituting an additional
warranty. HP shall not be liable for technical or editorial errors or omissions
contained herein.
Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation
5983-1956EN, Revision 2
, 06/2005

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents