Hp protecttools features – HP Compaq dc5750 Microtower-PC User Manual
Page 8
HP ProtectTools features
The following table details the key features of HP ProtectTools modules:
Module
Key features
Credential Manager for HP ProtectTools
●
Credential Manager acts as a personal password vault.
●
Single Sign On remembers multiple passwords for various
password-protected Web sites, applications, and network
resources.
●
Single Sign On offers additional protection by requiring
combinations of different security technologies, such as a Java™
Card and biometrics, for user authentication.
●
Password storage is protected through encryption and can be
hardened through the use of a TPM embedded security chip and/
or security device authentication, such as Java Cards or
biometrics.
Embedded Security for HP ProtectTools
●
Embedded Security uses a Trusted Platform Module (TPM)
embedded security chip to help protect against unauthorized
access to sensitive user data or credentials stored locally on a PC.
●
Embedded Security allows creation of a personal secure drive
(PSD) for protecting user data.
●
Embedded Security supports third-party applications (such as
Microsoft Outlook and Internet Explorer) for protected digital
certificate operations.
Java Card Security for HP ProtectTools
●
Java Card Security configures the HP ProtectTools Java Card for
user authentication before the operating system loads.
●
Java Card Security configures separate Java Cards for an
administrator and a user.
BIOS Configuration for HP ProtectTools
●
BIOS Configuration provides access to power-on user and
administrator password management.
●
BIOS Configuration provides an alternative to the pre-boot BIOS
configuration utility known as
F10
Setup.
●
DriveLock helps protect a hard drive from unauthorized access,
even if it is removed from a system, without requiring the user to
remember any additional passwords.
Drive Encryption for HP ProtectTools
●
Drive Encryption provides complete, full-volume hard drive
encryption.
●
Drive Encryption forces pre-boot authentication in order to decrypt
and access the data.
2
Chapter 1 Introduction to security
ENWW