Module | Key features |
|
|
Credential Manager | General users can perform the following functions: |
| ● Change user names and passwords. |
| ● Configure and change user credentials such as a Windows |
| password, fingerprint, face images, smart card, proximity card, |
| or contactless card. |
|
|
Password Manager | General users can perform the following functions: |
| ● Organize, and set up user names and passwords. |
| ● Create stronger passwords for enhanced account security. |
| Password Manager fills in and submits the information |
| automatically. |
| ● Streamline the logon process with the Single Sign On feature, |
| which automatically remembers and applies user credentials. |
|
|
Drive Encryption for HP ProtectTools (select models | ● Provides complete, |
only) | ● Forces |
| |
| the data. |
| ● Offers the option to activate |
| models only). |
|
|
Device Access Manager for HP ProtectTools (select | ● Allows IT managers to control access to devices based on user |
models only) | profiles. |
| ● Prevents unauthorized users from removing data using external |
| storage media, and from introducing viruses into the system |
| from external media. |
| ● Allows administrators to disable access to communication |
| devices for specific individuals or groups of users. |
|
|
Theft Recovery (Computrace for HP ProtectTools, | ● Requires separate purchase of tracking and tracing |
purchased separately) | subscriptions to activate. |
| ● Provides secure asset tracking. |
| ● Monitors user activity, as well as hardware and software |
| changes. |
| ● Remains active even if the hard drive is reformatted or replaced. |
|
|
HP ProtectTools security product description and common use examples
Most of the HP ProtectTools security products have both user authentication (usually a password) and an administrative backup to gain access if passwords are lost, not available, or forgotten, or any time corporate security requires access.
NOTE: Some of the HP ProtectTools security products are designed to restrict access to data. Data should be encrypted when it is so important that the user would rather lose the information than have it compromised. It is recommended that all data be backed up in a secure location.
2 | Chapter 1 Introduction to security |