HP ProtectTools security product description and common use examples
Most of the HP ProtectTools security products have both user authentication (usually a password) and an administrative backup to gain access if passwords are lost, not available, or forgotten, or any time corporate security requires access.
NOTE: Some of the HP ProtectTools security products are designed to restrict access to data. Data should be encrypted when it is so important that the user would rather lose the information than have it compromised. It is recommended that all data be backed up in a secure location.
Credential Manager for HP ProtectTools
Credential Manager (part of Security Manager) stores user names and passwords, and can be used to:
●Save login names and passwords for Internet access or
●Automatically log the user in to a Web site or
●Manage and organize authentications.
●Select a Web or network asset and directly access the link.
●View names and passwords when necessary.
Example 1: A purchasing agent for a large manufacturer makes most of her corporate transactions over the Internet. She also frequently visits several popular Web sites that require login information. She is keenly aware of security so does not use the same password on every account. The purchasing agent has decided to use Credential Manager to match Web links with different user names and passwords. When she goes to a Web site to log in, Credential Manager presents the credentials automatically. If she wants to view the user names and password, Credential Manager can be configured to reveal them.
Credential Manager can also be used to manage and organize the authentications. This tool will allow a user to select a Web or network asset and directly access the link. The user can also view the user names and passwords when necessary.
Example 2: A
Drive Encryption for HP ProtectTools
Drive Encryption is used to restrict access to the data on the entire computer hard drive or a secondary drive. Drive Encryption can also manage
Example 1: A doctor wants to make sure only he can access any data on his computer hard drive. The doctor activates Drive Encryption, which requires
4 | Chapter 1 Introduction to security |