HP H6325 HP iPAQ Security Solutions

HP H6325 - iPAQ Pocket PC Smartphone 55 MB Manual

HP H6325 manual content summary:

  • HP H6325 | HP iPAQ Security Solutions - Page 1
    Handheld Security Solutions Overview ...2 Security ...2 HP ProtectTools...3 Using HP ProtectTools...3 Odyssey Client...3 Biometric Fingerprint Reader (HP iPAQ hx2700 series only 4 Special issues related to security...4 Recovering from a locked device...5 Passphrases ...5 Performance considerations
  • HP H6325 | HP iPAQ Security Solutions - Page 2
    . Odyssey Client supports networks that adhere to the 802.11b wireless LAN standards. These networks can be found in hotels, airports, and other Internet hotspots. • A special Biometric Fingerprint Reader allows users to easily login with a swipe of the finger (HP iPAQ hx2700 series Pocket PC only
  • HP H6325 | HP iPAQ Security Solutions - Page 3
    Inc. CREDANT Mobile Guardian® (CMG) provides solutions that reduce specific security risks to handheld users. These security solutions provide certain advantages that allow you to protect your device more effectively. The first layer of security involves PIN or password access for HP iPAQ devices
  • HP H6325 | HP iPAQ Security Solutions - Page 4
    like a password or PIN. You can also find more specific information about how to enroll fingerprints using HP ProtectTools in the User's Guide on the Companion CD. (If you purchased an HP iPAQ hx2700 Pocket PC, the Companion CD is available with your device.) Special issues related to security
  • HP H6325 | HP iPAQ Security Solutions - Page 5
    runs in the background, so you are able to perform other tasks on your HP iPAQ during this time. There are two methods to monitor the decryption process. To find out more about encrypting and decrypting data, refer to the documentation on the Companion CD or Getting Started CD that came with your
  • HP H6325 | HP iPAQ Security Solutions - Page 6
    mobile user specific instructions on how to create, change, and start a VPN connection using your HP iPAQ, refer to the documentation that came with your device. To get specific information about turning on or off WLAN and Wi-Fi, refer to the documentation on the Companion CD or Getting Started CD
  • HP H6325 | HP iPAQ Security Solutions - Page 7
    WLANs enable a variety of mobile transactions such as Internet and otherwise perform on their business or home PCs. Before trying to connect to a service. Convenience and increased productivity make Wi-Fi hotspots attractive to users Companion CD or Getting Started CD that came with your HP iPAQ
  • HP H6325 | HP iPAQ Security Solutions - Page 8
    networks. This standard does not define any specific security protocol, but is based on EAP types Windows Mobile 2003 and Windows Mobile 5.0 users can download a free 30-day trial version of the software. Pointsec® for Pocket PC provides convenient, real-time encryption of information on mobile
  • HP H6325 | HP iPAQ Security Solutions - Page 9
    Service specification case sensitive.). Improved data encryption for WPA. TKIP provides stronger encryption than WEP. A way of providing users (for example, remote offices, telecommuters, etc.) secure access to their organization's network by way of the Internet. Physical hardware or computer software
  • HP H6325 | HP iPAQ Security Solutions - Page 10
    /atwork/default.mspx www.pointsec.com www.zonelabs.com © 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

HP iPAQ Handheld Security Solutions
Overview
..........................................................................................................................................................
2
Security
........................................................................................................................................................
2
HP ProtectTools
...............................................................................................................................................
3
Using HP ProtectTools
.................................................................................................................................
3
Odyssey Client
.................................................................................................................................................
3
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)
...........................................................................
4
Special issues related to security
.....................................................................................................................
4
Recovering from a locked device
.................................................................................................................
5
Passphrases
................................................................................................................................................
5
Performance considerations related to data encryption
...............................................................................
5
Network Connections
.......................................................................................................................................
6
Virtual Private Network and Wired Equivalency Privacy
..............................................................................
6
Wi-Fi Protected Access (WPA) and TKIP/AES
................................................................................................
6
Wireless fidelity (Wi-Fi)
................................................................................................................................
7
Wi-Fi hotspots
..............................................................................................................................................
7
WLAN standards
..........................................................................................................................................
7
Additional Security Solutions
...........................................................................................................................
8
Terminology
.....................................................................................................................................................
9
For more information
......................................................................................................................................
10
Call to action
..................................................................................................................................................
10