Example 1: A Stock Broker wants to make sure his
Privacy Manager for HP ProtectTools makes it easy to send and receive
Example 2: A CEO wants to insure that only the members of the board of directors can view the information he sends through
Computrace for HP ProtectTools is a service that can track the location of a stolen computer whenever the user accesses the Internet.
Example 1: A school principal instructed the IT department to keep track of all the computers at his school. After the inventory of the PCs was made, the IT Administrator registered all the computers with Computrace so they could be traced in case they were ever stolen. Recently, the school realized several computers were missing, so the IT Administrator alerted authorities and Computrace officials. The computers were located and were returned to the school by the authorities.
Computrace for HP ProtectTools can also help remotely manage and locate computers as well as monitor computer usage and applications.
Example 2: A real estate company needs to manage and update computers all over the world. They use Computrace to monitor and update the computers without having to send an IT person to each computer.
Accessing HP ProtectTools Security
To access HP ProtectTools Security Manager from the Windows Start menu:
▲In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager.
To access HP ProtectTools Security Manager Administrative Console from the Windows Start menu:
▲In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console.
NOTE: After you have configured the Password Manager module, you can also open
HP ProtectTools by logging on to Password Manager directly from the Windows logon screen.
Achieving key security objectives
The HP ProtectTools modules can work together to provide solutions for a variety of security issues, including the following key security objectives:
●Protecting against targeted theft
●Restricting access to sensitive data
●Preventing unauthorized access from internal or external locations
6 Chapter 1 Introduction to security | ENWW |