Achieving key security objectives
The HP ProtectTools modules can work together to provide solutions for a variety of security issues,
including the following key security objectives:
●
Protecting against targeted theft
●
Restricting access to sensitive data
●
Preventing unauthorized access from internal or external locations
●
Creating and using strong passwords
Protecting against targeted theft
An example of this type of incident would be the targeted theft of a computer containing confidential
data and customer information in a cubicle or open environment. The following features help protect
against targeted theft:
●
The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See
the following procedures:
◦
“
Assigning a name to a Java Card on page 32”
◦
“
Device Access Manager for HP ProtectTools on page 41 ”
◦
“
Drive Encryption for HP ProtectTools on page 46”
●
DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and
installed into an unsecured system. Refer to “
Security on page 38”.
●
The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools
module, encrypts sensitive data to help ensure it cannot be accessed without authentication. See
the following procedures:
◦
Embedded Security “
Setup procedures on page 25”
◦
“
Using the Personal Secure Drive on page 27”
Restricting access to sensitive data
Suppose a contractor is working onsite and has been given computer access to review sensitive financial
data; you do not want the contractor to be able to print the files or save them to a writeable device such
as a CD. The following feature helps restrict access to data:
●
Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable
devices so sensitive information cannot be printed or copied from the hard drive onto removable
media. See “
Device class configuration (advanced) on page 44.”
●
DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and
installed into an unsecured system. Refer to “
Security on page 38”.
Achieving key security objectives 5