Page: 17 from 25
HP ProtectTools File Sanitizer setup menu
File sanitization is more intensive process than simple file deletion. The amount of time it takes to
delete a file or a group of files is in direct relation to their size. File Sanitizer is therefore not a
replacement for simple file deletion; it is instead meant to complement it. Free Space Bleaching can
also be set up to bleach the hard drive at a predetermined schedule.
Computrace® LoJack Pro for HP ProtectTools
Computrace LoJack Pro, powered by Absolute Software (purchased separately), addresses the
growing problem of computers that are lost or stolen. Activating this software enables the Computrace
agent, which remains active in your computer even if the hard drive is reformatted or replaced. LoJack
Pro permits remote monitoring, management, and tracking of your computer. Absolute’s recovery
team will assist in your computer’s recovery if it is lost or stolen, depending on geographic location.
Privacy Manager for HP ProtectTools
W hen it comes to information security, concerns typically revolve around lost or stolen notebooks, or
unauthorized access to the network. However, information can easy fall into the wrong hands through
normal everyday communications tools such as instant messaging and email.
Privacy Manager for HP ProtectTools allows you to secure the documents and emails you create within
Microsoft Office applications and enables strong privacy of your IM chats when communicating via
Microsoft Live Messenger. W ith Privacy Manager you can be sure that only those friends, clients or
colleagues you select will be able to open and read a given document, email or instant message.
Additionally, your recipients can be certain that such files were created by you, and never modified
by anyone else, since Privacy Manager leverages the strong, multifactor user authentication provided
by HP ProtectTools. The result is that you can now take control of the information you create and
communicate to ensure its privacy, security, and integrity, not just on your local computer, but
wherever it may ultimately be transmitted or stored. Identity assurance and access control of