Preventing unauthorized access from internal or external locations Laptop elitebook HP Планшетный ПК HP EliteBook 2740p

Page: 11 from 101

background image

Achieving key security objectives

The HP ProtectTools modules can work together to provide solutions for a variety of security issues,
including the following key security objectives:

Protecting against targeted theft

Restricting access to sensitive data

Preventing unauthorized access from internal or external locations

Creating strong password policies

Addressing regulatory security mandates

Protecting against targeted theft

An example of targeted theft would be the theft of a computer containing confidential data and customer
information at an airport security checkpoint. The following features help protect against targeted theft:

The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See
the following procedures:

Security Manager

Drive Encryption

Restricting access to sensitive data

Suppose a contract auditor is working onsite and has been given computer access to review sensitive
financial data; you do not want the auditor to be able to print the files or save them to a writeable device
such as a CD. The following feature helps restrict access to data:

Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable
devices so sensitive information cannot be printed or copied from the hard drive onto removable
media.

Preventing unauthorized access from internal or external locations

Unauthorized access to an unsecured business PC presents a very tangible risk to corporate network
resources such as information from financial services, an executive, or R&D team, and to private
information such as patient records or personal financial records. The following features help prevent
unauthorized access:

The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See
the following procedures:

Password Manager

Drive Encryption

Password Manager helps ensure that an unauthorized user cannot get passwords or access to
password-protected applications.

Achieving key security objectives

3