HP Client Security Getting Started

manual shred
Immediate shredding of an asset or selected assets, which bypasses a scheduled shred.
network account
A Windows user or administrator account, either on a local computer, in a workgroup, or on a domain.
PIN
A personal identification number for an enrolled user to be used for authentication.
PKI
The Public Key Infrastructure standard that defines the interfaces for creating, using, and administering
certificates and cryptographic keys.
power-on authentication
A security feature that requires some form of authentication, such as a smart card, security chip, or password,
when the computer is turned on.
proximity card
A plastic card containing a computer chip that can be used for authentication in conjunction with other
credentials for additional security.
reboot
The process of restarting the computer.
restore
A process that copies program information from a previously saved backup file into this program.
security logon method
The method used to log on to the computer.
shred
The execution of an algorithm that overwrites the data contained in an asset with meaningless data.
Single Sign On
A feature that stores authentication information and allows you to use HP Client Security to access Internet and
Windows applications that require password authentication.
smart card
A hardware device that can be used with a PIN for authentication.
software encryption
The use of software to encrypt the hard drive sector by sector. This process is slower than hardware encryption
Trust Circle
Provides data containment by binding the data to a defined group of trusted users. This prevents data from
falling into the wrong hands either accidentally or intentionally. Secured with CryptoMill’s Zero Overhead Key
Management technology, data is cryptographically bound to a circle of trust. This prevents decryption of
documents or other sensitive information outside of the trust circle
Trust Circle folder
Any folder protected by a trust circle.
Trust Circle Manager/Reader
The Trust Circle Reader can only accept invitations sent out by Trust Circle Manager users. However, Trust
Circle Manager allows the creation of trust circles. Features include inviting someone via email to a trust circle
and accepting trust circle invitations from others. Once a trust circle is established among peers, files protected
by that trust circle can be shared securely.
Trusted Platform Module (TPM) embedded security chip
56 Glossary