Embedded security for hp protecttools, Drive encryption for hp protecttools – HP HP ProtectTools Security Software, Version 6.0 (User Guide) User Manual
Page 14
Example 1: A Purchasing Agent for a large manufacturer makes most of her corporate transactions
over the Internet. She also frequently visits several popular web sites that require login information.
She is keenly aware of security so does not use the same password on every account. The
Purchasing Agent has decided to use Credential Manager to match web links with different user
names and passwords. When she goes to a web site to log in, Credential Manager presents the
credentials automatically. If she wants to view the user names and password, Credential Manager
can be configured to reveal them.
Credential Manager can also be used to manage and organize the authentications. This tool will allow
a user to select what web or network asset they choose and directly access the link. The user can
also view the user names and passwords when necessary.
Example 2: A hard working CPA has been promoted and will now manage the entire accounting
department. The team must log into a large number of client web accounts with each account using
different login information. This login information needs to be shared with other workers so
confidentiality is an issue. The CPA decides to organize all the web links, company user names, and
passwords within Credential Manager for HP ProtectTools. Once complete, the CPA deploys
Credential Manager to the employees so they can work on the web accounts and never know the
login credentials that they are using.
Embedded Security for HP ProtectTools
Embedded Security for HP ProtectTools provides the ability to create a Personal Secure Drive. This
capability allows the user to create a virtual drive partition on the PC that is completely hidden until
accessed. Embedded Security could be used anywhere data needs to be secretly protected while the
rest of the data is not encrypted.
Example 1: A Warehouse Manager has a computer that multiple workers access intermittently
throughout the day. The Manager wants to encrypt and hide confidential warehouse data on the
computer. He wants the data to be so secure that even if someone steals the hard drive, they cannot
decrypt the data or read it. The Warehouse Manager decides to activate Embedded Security and
moves the confidential data to the Personal Secure Drive. The Warehouse Manager can enter a
password and access the confidential data just like another hard drive. When he logs off or reboots
the Personal Secure Drive, it cannot be seen or opened without the proper password. The workers
never see the confidential data when they access the computer.
Embedded Security protects encryption keys within a hardware TPM (Trusted Computing Module)
chip located on the motherboard. It is the only encryption tool that meets the minimum requirements
to resist password attacks where someone would attempt to guess the decryption password.
Embedded Security can also encrypt the entire drive and e-mail.
Example 2: A Stock Broker wants to transport extremely sensitive data to another computer using a
portable drive. She wants to make sure that only these two computers can open the drive, even if the
password is compromised. The Stock Broker uses Embedded Security TPM migration to allow a
second computer to have the necessary encryption keys to decrypt the data. During the transport
process, even with the password, only the two physical computers can decrypt the data.
Drive Encryption for HP ProtectTools
Drive Encryption is most often used to restrict access to the data on the entire computer hard drive or
a secondary hard drive. Drive Encryption can also manage SED (Self Encrypting Drive) drives.
Example 1: A Doctor wants to make sure only he can access any data on his computer hard drive.
The Doctor activates Drive Encryption which enables preboot or requiring authentication before
Windows login. Once set up, the hard drive cannot be opened without a password before it even
boots to the operating system. The Doctor could further enhance drive security by choosing to
encrypt the data with the SED (Self Encrypting Drive) option.
4
Chapter 1 Introduction to security
ENWW