HP Client Security Getting Started

Module Key features
Password Manager General users can perform the following functions:
Organize, and set up user names and passwords.
Create stronger passwords for enhanced account security for
email and Web accounts. Password Manager fills in and
submits the information automatically.
Streamline the logon process with the Single Sign On feature,
which automatically remembers and applies user credentials.
Mark an account as compromised, so that you will be alerted for
other account(s) with similar credentials.
Import logon data from a supported browser.
HP Drive Encryption (select models only) Provides complete, full-volume hard drive encryption.
Forces pre-boot authentication in order to decrypt and access
the data.
Offers the option to activate self-encrypting drives (select
models only).
HP Device Access Manager
Allows IT managers to control access to devices based on user
profiles.
Prevents unauthorized users from removing data using external
storage media, and from introducing viruses into the system
from external media.
Allows administrators to disable access to communication
devices for specific individuals or groups of users.
HP Trust Circles Provides file and document security.
Encrypts files placed in user-specified folders and protects them
within a trust circle.
Allows files to be used and shared only by members in the trust
circle.
Theft Recovery (Computrace, purchased separately)
Requires separate purchase of tracking and tracing
subscriptions to activate.
Provides secure asset tracking.
Monitors user activity, as well as hardware and software
changes.
Remains active even if the hard drive is reformatted or replaced.
HP Client Security product description and common use
examples
Most of the HP Client Security products have both user authentication (usually a password) and an
administrative backup to gain access if passwords are lost, not available, or forgotten, or any time
corporate security requires access.
NOTE: Some of the HP Client Security products are designed to restrict access to data. Data
should be encrypted when it is so important that the user would rather lose the information than have
it compromised. It is recommended that all data be backed up in a secure location.
2 Chapter 1 Introduction to HP Client Security Manager