HP ProtectTools - Windows Vista and Windows XP
HP ProtectTools features
The following table details the key features of HP ProtectTools modules:
Module Key features
Credential Manager for HP ProtectTools
●
Credential Manager acts as a personal password vault,
streamlining the logon process with the Single Sign On feature,
which automatically remembers and applies user credentials.
●
Single Sign On also offers additional protection by requiring
combinations of different security technologies, such as a Java™
Card and biometrics, for user authentication.
●
Password storage is protected through software encryption and
can be enhanced through the use of a TPM embedded security
chip and/or security device authentication, such as Java Cards or
biometrics.
Drive Encryption for HP ProtectTools (select models
only)
●
Drive Encryption provides complete, full-volume hard drive
encryption.
●
Drive Encryption forces pre-boot authentication in order to decrypt
and access the data.
Privacy Manager for HP ProtectTools (select models
only)
●
Privacy Manager utilizes advanced logon techniques to verify the
source, integrity, and security of communication when using e-
mail, Microsoft® Office documents, or instant messaging (IM).
File Sanitizer for HP ProtectTools
●
File Sanitizer allows you to securely shred digital assets (sensitive
information including application files, historical or Web-related
content, or other confidential data) on your computer and
periodically bleach the hard drive.
BIOS Configuration for HP ProtectTools
●
BIOS Configuration provides access to power-on user and
administrator password management.
●
BIOS Configuration provides an alternative to the pre-boot BIOS
configuration utility known as Computer Setup.
●
BIOS Configuration enablement of automatic DriveLock support,
which is enhanced with the embedded security chip, helps protect
a hard drive from unauthorized access, even if it is removed from
a system, without requiring the user to remember any additional
passwords beyond the embedded security chip user password.
2 Chapter 1 Introduction to security