HP Client Security Commercial Managed IT Software

23
HP Trust Circles
The HP Trust Circles file and document security application combines folder file encryption with a
convenient trusted-circle document-sharing capability. The application encrypts files placed in user-
specified folders, protecting them within a Trust Circle. Once protected, the files can be shared with anyone,
but only those in the Trust Circle can truly access them. If a protected file is received by a non-member, the
file remains encrypted, and the non-member cannot access the contents.
Trust Circles prevents accidental data breach. Having a Trust Circle established between a user and his / her
peers allows for near effortless secure data sharing, while also keeping the data at rest protected. No
additional passwords required other than your Windows password to authenticate, or using additional
credentials as allowed by session policies within HP Client Security.
Data is encrypted at the file level. Depending on the usage scenario, a file is either presented encrypted or
decrypted to applications. For example: when attaching a file to an email, the file is presented in encrypted
form so the encrypted file will be attached, therefore ensuring protection.
Once you have setup Trust Circles for your email you can begin to create Trust Circles. Contacts are invited
by email to join a Trust Circle.
There are two ways to send email invitations and to reply to them:
1. Using Microsoft® Outlook - Microsoft Outlook automates the processing of any Trust Circle invitations and
responses from other Trust Circle users.
2. Using Gmail, Yahoo, Outlook.com or other email services (SMTP) - when you enter your name, email address, and
password; Trust Circles uses your email service to send email invitations to the members selected to join your
trust circle.
Trust Circle invitations will include a link that they can click on to download free HP Trust Circles Reader or
purchase HP Trust Circles Pro (http://hptc.cryptomill.com).
Once members are confirmed, they will be able to read files you share with them that have been placed in
that Trust Circle folder(s). If you should happen to send one of the encrypted files form the Trust Circle to
someone that is not a member, they will not be able to read the file.
Technology
User protected files (Word Docs, PDF’s, Excel, etc.) are encrypted using AES 128.
Internal Trust Circle information (including the Trust Circles encryption keys themselves) are encrypted using AES
256.
Limitations
HP Trust Circles Standard supports up to 5 Trust Circles each with a maximum of 5 members in each Trust Circle.
HP Trust Circles Reader, allows you to accept invitations sent out by HP Trust Circles users, and read encrypted
files from Trust Circles of which you are a member. It cannot create a Trust Circle.
HP Trust Circles cannot protect system files or other parts of the operating system such as system folders and
the recycle bin.
Authentication
When installed with HP Client Security, authentication is handled through HP Client Security using one of the
enrolled authentication methods.
When installed standalone without HP Client Security, Trust Circles uses your Windows Password for
Authentication