HP Client Security Getting Started

Protecting against targeted theft
An example of targeted theft would be the theft of a computer containing confidential data and
customer information at an airport security checkpoint. The following features help protect against
targeted theft:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system.
HP Client Security—See
HP Client Security on page 12.
HP Drive Encryption—See
HP Drive Encryption (select models only) on page 28.
Encryption helps ensure that data cannot be accessed even if the hard drive is removed and
installed into an unsecured system.
Computrace can track the computer's location after a theft.
Computrace—See
Theft recovery (select models only) on page 50.
Restricting access to sensitive data
Suppose a contract auditor is working onsite and has been given computer access to review sensitive
financial data. You do not want the auditor to be able to print the files or save them to a writable
device, such as a CD. The following feature helps restrict access to data:
HP Device Access Manager allows IT managers to restrict access to communication devices so
that sensitive information cannot be copied from the hard drive. See
System view on page 41.
Preventing unauthorized access from internal or external locations
Unauthorized access to an unsecured business computer presents a very real risk to corporate
network resources such as information from financial services, an executive, or the Research and
Development team, and to private information such as patient records or personal financial records.
The following features help prevent unauthorized access:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system.
(see
HP Drive Encryption (select models only) on page 28.
HP Client Security helps ensure that an unauthorized user cannot get passwords or access to
password-protected applications. See
HP Client Security on page 12.
HP Device Access Manager allows IT managers to restrict access to writable devices so
sensitive information cannot be copied from the hard drive. See
HP Device Access Manager
(select models only) on page 40.
Creating strong password policies
If a company policy goes into effect that requires the use of strong password policy for dozens of
Web-based applications and databases, Password Manager provides a protected repository for
passwords and Single Sign On convenience. See
Password Manager on page 18.
Additional security elements
Assigning security roles
In managing computer security (particularly for large organizations), one important practice is to
divide responsibilities and rights among various types of administrators and users.
Additional security elements 5