HP Client Security Commercial Managed IT Software
10 
HP Client Security – Manageability Options 
HP Client Security has multiple management options: 
  Local Management - HP Client Security application allows for full policy configuration. 
o  Limited users may not change policies. 
o  Policies can be set in an image before deployment. 
  HP Credential Manager cloud-based remote management - DigitalPersona offers Pro Workgroup SaaS 
o  Access Recovery, credential policies, HP Drive Encryption (for HP Business PCs launched prior to 2012), and 
centralized reporting 
o  5 licenses are available for testing/pilot 
o  Visit www.protecttools.com for more details 
  HP Drive Encryption– upgrade to WinMagic SecureDoc Enterprise for remote management. 
o  HP offers licensing for HP and non-HP PCs. 
o  Contact your HP Sales representative or reseller as well as Visit www.winmagic.com/hp for more details 
  BIOS remote management 
o  Most features are managed remotely by LANDesk, HP BIOS Configuration Utility and other management 
consoles. 
o  Visit www.hp.com/go/clientmanagement for more details. 
Remote Management Alternatives to HP Client Security Technology 
  HP Enterprise Device Access Manager 
o  It provides similar functionality to HP Device Access Manager but with centralized manageability. 
o  Offers administration tools to define and maintain the device access control policy which is stored in 
Windows Active Directory. 
o  Does not support Just In Time Authentication 
o  Visit www.hp-protecttools.com/products.asp 
  SEAHawk 
o  SEAHawk provides similar capabilities to HP Trust Circles, allowing IT to determine Trust Boundaries for 
users and integration into Active Directory 
  Contact your HP sales representative for more information. 
HP Client Security Technology 
HP Client Security consists of the following key security technologies: 
Security and Encryption Strength 
HP Client Security’s core host application adheres to a strong security model with the following features: 
  Execute all “secure operations”, such as, user authentication, user provisioning, credential management, and 
policy configuration from a highly privileged account. 
  Use Windows ACLs (Access Control List) to protect access to resources, such as registry data. 










