Page: 16 from 25
and passwords. At most sites that require a password, a window pops up over your browser and
gives you the option to log in using Face Recognition.
HP recommends that a minimum of two factors be used to create a more secure environment. HP
ProtectTools has additional authentication options, such as fingerprint authentication, which can be
combined with Face Recognition to provide exceptional security.
Face Recognition for HP ProtectTools was developed in conjunction with C ogent, a leading
biometric solutions provider.
File Sanitizer for HP ProtectTools
Files dropped into the recycle bin can easily be recovered. The recovery process is as simple as
opening the recycle bin, and restoring the files. Even once the recycle bin is emptied, the files remain
on the hard drive and can be recovered using disk utilities available online.
W hen you delete a file, it is removed from the hard drive directory. The process is quick and requires
the same amount of time regardless of the size of the file. Removing the link to the file from the
directory makes the space occupied by the file available to new files. The deleted file however,
continues to reside on the hard drive and can be recovered until it is overwritten by another file.
N ormal file deletion process, while fast and convenient, also poses a security threat because deleted
information could be recovered by an unauthorized person.
File sanitization, also referred to as shredding, is a process where the data designated to be erased is
overwritten multiple times with meaningless bits in order to ensure that it cannot be recovered. File
sanitization is an intensive process and makes the erased data unrecoverable.
Bleaching is a process where previously used space on a hard drive is overwritten to ensure no
deleted data can be recovered.
File Sanitizer for HP ProtectTools starts by placing an icon on the desktop. You can then shred files by
simply dragging and dropping onto the File Sanitizer icon. You can also define files and folders that
you want shredded automatically, and define the schedules. This level of control is available in File
Sanitizer settings (Figure 9), where security levels can be selected as well custom control over types of
information to erase (i.e. cookies, temporary files, etc.). File Sanitizer can then be set up to erase the
predefined files based on events such as W indows shutdown.