
10
HP Client Security – Manageability Options
HP Client Security has multiple management options:
Local Management - HP Client Security application allows for full policy configuration.
o Limited users may not change policies.
o Policies can be set in an image before deployment.
HP Credential Manager cloud-based remote management - DigitalPersona offers Pro Workgroup SaaS
o Access Recovery, credential policies, HP Drive Encryption (for HP Business PCs launched prior to 2012), and
centralized reporting
o 5 licenses are available for testing/pilot
o Visit www.protecttools.com for more details
HP Drive Encryption– upgrade to WinMagic SecureDoc Enterprise for remote management.
o HP offers licensing for HP and non-HP PCs.
o Contact your HP Sales representative or reseller as well as Visit www.winmagic.com/hp for more details
BIOS remote management
o Most features are managed remotely by LANDesk, HP BIOS Configuration Utility and other management
consoles.
o Visit www.hp.com/go/clientmanagement for more details.
Remote Management Alternatives to HP Client Security Technology
HP Enterprise Device Access Manager
o It provides similar functionality to HP Device Access Manager but with centralized manageability.
o Offers administration tools to define and maintain the device access control policy which is stored in
Windows Active Directory.
o Does not support Just In Time Authentication
o Visit www.hp-protecttools.com/products.asp
SEAHawk
o SEAHawk provides similar capabilities to HP Trust Circles, allowing IT to determine Trust Boundaries for
users and integration into Active Directory
Contact your HP sales representative for more information.
HP Client Security Technology
HP Client Security consists of the following key security technologies:
Security and Encryption Strength
HP Client Security’s core host application adheres to a strong security model with the following features:
Execute all “secure operations”, such as, user authentication, user provisioning, credential management, and
policy configuration from a highly privileged account.
Use Windows ACLs (Access Control List) to protect access to resources, such as registry data.
Comentarios a estos manuales