of USB devices, network connections, and so on. An example would be a situation where outside vendors need access to company computers but should not be able to copy the data to a USB drive.

Example 1: A manager of a medical supply company often works with personal medical records along with his company information. The employees need access to this data, however, it is extremely important that the data is not removed from the computer by a USB drive or any other external storage media. The network is secure, but the computers have CD burners and USB ports that could allow the data to be copied or stolen. The Manager uses Device Access Manager to disable the USB ports and CD burners so they cannot be used. Even though the USB ports are blocked, mouse and keyboards will continue to function.

Example 2: An insurance company does not want its employees to install or load personal software or data from home. Some employees need access to the USB port on all computers. The IT manager uses Device Access Manager to enable access for some employees while blocking external access for others.

Computrace for HP ProtectTools (formerly LoJack Pro) (purchased separately)

Computrace for HP ProtectTools (purchased separately) is a service that can track the location of a stolen computer whenever the user accesses the Internet. Computrace for HP ProtectTools can also help remotely manage and locate computers, as well as monitor computer usage and applications.

Example 1: A school principal instructed the IT department to keep track of all the computers at his school. After the inventory of the computers was made, the IT administrator registered all the computers with Computrace so they could be traced in case they were ever stolen. Recently, the school realized several computers were missing, so the IT administrator alerted the authorities and Computrace officials. The computers were located and were returned to the school by the authorities.

Example 2: A real estate company needs to manage and update computers all over the world. They use Computrace to monitor and update the computers without having to send an IT person to each computer.

Achieving key security objectives

The HP ProtectTools modules can work together to provide solutions for a variety of security issues, including the following key security objectives:

Protecting against targeted theft

Restricting access to sensitive data

Preventing unauthorized access from internal or external locations

Creating strong password policies

4

Chapter 1 Introduction to security

Page 10
Image 10
HP 610 G1 manual Achieving key security objectives

610 G1 specifications

The HP ProBook 610 G1 is a robust, enterprise-grade laptop designed primarily for business professionals who demand reliability and performance in their everyday computing tasks. Introduced as part of HP’s ProBook series, the 610 G1 balances usability, durability, and security features, making it suitable for mobile workforces and corporate environments.

One of the standout features of the HP 610 G1 is its powerful performance capabilities. The device is equipped with Intel’s 4th generation Core processors, ranging from the i3 to i7 options, offering versatile configurations tailored to meet various performance needs. With options for up to 16GB of RAM, the laptop ensures smooth multitasking and efficient handling of demanding applications.

The build quality of the 610 G1 is commendable, featuring a sturdy chassis that meets military-standard durability tests. This ensures that the laptop can withstand the rigors of travel and daily use without compromising functionality. The spill-resistant keyboard further adds to its longevity, allowing users to maintain productivity even in challenging conditions.

In terms of display, the ProBook 610 G1 comes with a 15.6-inch screen, available in both HD and Full HD resolutions. This offers ample screen real estate for productivity tasks, while anti-glare technology ensures that users can work effectively in various lighting conditions. Furthermore, the laptop includes integrated Intel HD Graphics, allowing for adequate visuals for business presentations and multimedia tasks.

Connectivity is another strength of the HP 610 G1. It features multiple USB ports, including USB 3.0 for high-speed data transfer, alongside HDMI and VGA ports for connecting to external displays. The device also offers options for Wi-Fi and Bluetooth, enabling seamless connection to networks and peripherals.

Security is a top priority in business environments, and the HP ProBook 610 G1 does not fall short. It includes features such as a fingerprint reader for biometric authentication, TPM (Trusted Platform Module) for secure storage of encryption keys, and HP’s Sure Start technology, which protects the BIOS from attacks and ensures system integrity.

In summary, the HP ProBook 610 G1 is a well-rounded laptop that combines performance, durability, and security features tailored for the business professional. With its solid build, powerful processing options, and robust connectivity, it provides a reliable solution for productivity-driven users. Whether in the office or on the go, the ProBook 610 G1 stands out as a capable workhorse in the competitive business laptop market.