Protecting against targeted theft

An example of targeted theft would be the theft of a computer containing confidential data and customer information at an airport security checkpoint. The following features help protect against targeted theft:

The pre-boot authentication feature, if enabled, helps prevent access to the operating system.

Security Manager for HP ProtectTools—See HP ProtectTools Security Manager on page 23.

Drive Encryption for HP ProtectTools—SeeDrive Encryption for HP ProtectTools (select models only) on page 38.

Encryption helps ensure that data cannot be accessed even if the hard drive is removed and installed into an unsecured system.

Computrace can track the computer's location after a theft.

Computrace for HP ProtectTools—SeeTheft recovery (select models only) on page 56.

Restricting access to sensitive data

Suppose a contract auditor is working onsite and has been given computer access to review sensitive financial data; you do not want the auditor to be able to print the files or save them to a writable device such as a CD. The following feature helps restrict access to data:

Device Access Manager for HP ProtectTools allows IT managers to restrict access to communication devices so that sensitive information cannot be copied from the hard drive. See Device Class Configuration on page 48.

Preventing unauthorized access from internal or external locations

Unauthorized access to an unsecured business computer presents a very real risk to corporate network resources such as information from financial services, an executive, or the R&D team, and to private information such as patient records or personal financial records. The following features help prevent unauthorized access:

The pre-boot authentication feature, if enabled, helps prevent access to the operating system.:

Security Manager for HP ProtectTools—See HP ProtectTools Security Manager on page 23.

Drive Encryption for HP ProtectTools—SeeDrive Encryption for HP ProtectTools (select models only) on page 38.

Security Manager helps ensure that an unauthorized user cannot get passwords or access to password-protected applications. See HP ProtectTools Security Manager on page 23.

Device Access Manager for HP ProtectTools allows IT managers to restrict access to writable devices so sensitive information cannot be copied from the hard drive. See Device Access Manager for HP ProtectTools (select models only) on page 46.

Creating strong password policies

If a company policy goes into effect that requires the use of strong password policy for dozens of Web-based applications and databases, Security Manager provides a protected repository for passwords and Single Sign On convenience. See HP ProtectTools Security Manager on page 23.

Achieving key security objectives

5