
HP iPAQ Handheld Security Solutions
Overview..........................................................................................................................................................  | 2  | 
Security........................................................................................................................................................  | 2  | 
HP ProtectTools...............................................................................................................................................  | 3  | 
Using HP ProtectTools.................................................................................................................................  | 3  | 
Odyssey Client.................................................................................................................................................  | 3  | 
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)...........................................................................  | 4  | 
Special issues related to security.....................................................................................................................  | 4  | 
Recovering from a locked device.................................................................................................................  | 5  | 
Passphrases ................................................................................................................................................  | 5  | 
Performance considerations related to data encryption...............................................................................  | 5  | 
Network Connections.......................................................................................................................................  | 6  | 
Virtual Private Network and Wired Equivalency Privacy ..............................................................................  | 6  | 
6  | |
Wireless fidelity   | 7  | 
7  | |
WLAN standards..........................................................................................................................................  | 7  | 
Additional Security Solutions ...........................................................................................................................  | 8  | 
Terminology .....................................................................................................................................................  | 9  | 
For more information......................................................................................................................................  | 10  | 
Call to action ..................................................................................................................................................  | 10  |