resist password attacks where someone would attempt to guess the decryption password. Embedded Security can also encrypt the entire drive and
Example 2: A stock broker wants to transport extremely sensitive data to another computer using a portable drive. She wants to make sure that only these two computers can open the drive, even if the password is compromised. The stock broker uses Embedded Security TPM migration to allow a second computer to have the necessary encryption keys to decrypt the data. During the transport process, even with the password, only the two physical computers can decrypt the data.
HP ProtectTools security product description and common use examples 7