HP iPAQ Handheld Security Solutions
Overview.......................................................................................................................................................... | 2 |
Security........................................................................................................................................................ | 2 |
HP ProtectTools............................................................................................................................................... | 3 |
Using HP ProtectTools................................................................................................................................. | 3 |
Odyssey Client................................................................................................................................................. | 3 |
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)........................................................................... | 4 |
Special issues related to security..................................................................................................................... | 4 |
Recovering from a locked device................................................................................................................. | 5 |
Passphrases ................................................................................................................................................ | 5 |
Performance considerations related to data encryption............................................................................... | 5 |
Network Connections....................................................................................................................................... | 6 |
Virtual Private Network and Wired Equivalency Privacy .............................................................................. | 6 |
6 | |
Wireless fidelity | 7 |
7 | |
WLAN standards.......................................................................................................................................... | 7 |
Additional Security Solutions ........................................................................................................................... | 8 |
Terminology ..................................................................................................................................................... | 9 |
For more information...................................................................................................................................... | 10 |
Call to action .................................................................................................................................................. | 10 |