HP Client Security Commercial Managed IT Software

7
5. For the use cases outlined in the DOD 5220.22-M Supplement. Traditional hard drives supported.
6. Windows required. When included, HP Trust Circles Standard allows up to 5 Trust Circles with up to 5 contacts in each Trust Circle.
HP Trust Circles Pro required for unrestricted number of Trust Circles and contacts. HP Trust Circles Reader is available to allow a
contact to participate in an invited Trust Circle. Available at http://hptc.cryptomill.com.
7. Requires initial setup and Microsoft Outlook and Microsoft Office. One year of service included. For users without HP Privacy
Manager, DigitalPersona Privacy Manager is required for sharing encrypted files and emails, and six months of service is included.
Users can use their own compatible digital certificate instead of offered service. No longer supported or provided on Business PCs
launched after September 2013.
8. For the methods outlined in the National Institute of Standards and Technology Special Publication 800-88. ElitePad 900 G1
support with BIOS F.03 and higher.
Table 2 Device Protection Security Features
Layer Device protection Description
BIOSphere HP Sure Start
1
HP Sure Start is the first and only self-healing technology solution
created to protect against Malware and Security attacks aimed at
the BIOS, developed in collaboration with HP Labs. Sure Start is a
hardware based solution that protects and recovers the BIOS Boot
Block regardless of the cause of corruption or compromise
assuring a virtually un-interrupted boot. Sure Start is independent
of CPU such that any virus or malware is not aware of Sure Start or
any of its components making this a technology not easily
susceptible to attacks.
HP BIOS Protection
2
Developed according to NIST SP 800-147 security guidelines, this
feature protects the BIOS from attacks. All BIOS updates are
checked for a proper cryptographic signature. If this check fails,
the platform will refuse the update.
If malware is able to circumvent this process, and malicious
code is detected, the BIOS repairs itself using a verified BIOS
copy that is stored in the system flash memory or in the
HP_Tools partition. Otherwise, the system does not boot
and emits a particular LED code. Users can recover manually
by flashing the BIOS from a USB storage device.
Pre-boot Security Built-in security features such as BIOS security, port control,
communications device control, boot options, and Absolute
Persistence module.
Absolute Persistence
3
(See Absolute Data Protect
(ADP) on page 31)
Once subscribed and activated to supported Absolute services
(purchased separately), the Persistence Module ensures that
activated Absolute software services, like Computrace have their
agent replaced in Windows, if it is ever removed. For more
information visit http://www.absolute.com/ .
Master Boot Record Security Backup and then restore your MBR if it gets compromised.
Business Desktops BIOS can additionally lock the MBR so that it
cannot be written to while locked.
Software-based HP Device Access Manager
with Just in Time
Authentication
(See HP Device Access
Manager (HPDAM) on page
19)
Provides advanced security options to selectively block ports,
connections, and storage devices that can compromise the
security of your PC or your network.
Allows an Administrator to define which users or groups
have access to which devices that are connected to or
integrated into the PC.
Prevents someone from walking up to your unlocked PC and
taking data off your computer onto a USB Drive
Just In Time Authentication allows data transfer to
Removable Storage (ex. USB Drives) or Optical Disk Drives
for a brief period of time only after the user validates their
identity.
Absolute Data Protect
3
Enables you to manage your PC remotely with remote Find, Lock,
or file Erase.