HP ProtectTools Security Software 2010 - Technical White Paper
17 
Fi g u r e 9. HP ProtectTools File Sanitizer setup menu 
File sanitization is more intensive process than simple file deletion. The amount of time it takes to 
delete a file or a group of files is in direct relation to their size. File Sanitizer is therefore not a 
replacement for simple file deletion; it is instead meant to complement it. Free Space Bleaching can 
also be set up to bleach the hard drive at a predetermined schedule. 
Computrace® Lo Ja c k Pro for HP ProtectTools 
Computrace LoJack Pro, powered by Absolute Software (purchased separately), addresses the 
growing problem of computers that are lost or stolen. Activating this software enables the Computrace 
agent, which remains active in your computer even if the hard drive is reformatted or replaced. Lo Ja c k  
Pro permits remote monitoring, management, and tracking of your computer. Absolute’ s recovery 
team will assist in your computer’s recovery if it is lost or stolen, depending on geographic location. 
Privacy Manager for HP ProtectTools 
W hen it comes to information security, concerns typically revolve around lost or stolen notebooks, or 
unauthorized access to the network. However, information can easy fall into the wrong hands through 
normal everyday communications tools such as instant messaging and email. 
Privacy Manager for HP ProtectTools allows you to secure the documents and emails you create within 
Microsoft Office applications and enables strong privacy of your IM chats when communicating via 
Microsoft Live Messenger. W ith Privacy Manager you can be sure that only those friends, clients or 
colleagues you select will be able to open and read a given document, email or instant messa g e. 
Additionally, your recipients can be certain that such files were created by you, and never modified 
by anyone else, since Privacy Manager leverages the strong, multifactor user authentication provided 
by HP ProtectTools. The result is that you can now take control of the information you create and 
communi cate to ensure its privacy, security, and integrity, not just on your local computer, but 
wherever it may ultimately be transmitted or stored. Identity assurance and access control of 










