While security features increasingly rely on established
industry standards and are better integrated with other security elements, there
are still challenges to widespread deployment and utilization. These challenges
include usability, manageability, awareness, interoperability and extensibility.
Some of the following integrated tools can go a long way in
protecting data and providing a secured mobility experience.
Credential Manager: The core functionalities delivered by
credential manager are multi-factor authentication, Windows logon service, and
single sign-on backed by identity storage, backup, and migration capabilities.
These help in various ways such as single sign-on which is more convenient for
the user and password security, fully-integrated embedded security chip support
that can provide another authentication factor while protecting the user's
credentials.
Embedded Security: OS-level security solutions can provide a
high level of protection against unauthorized access. But in order to truly
protect a system at each of the points of vulnerability, security has to be
built into the hardware and firmware.
BIOS Configuration: Some users may not be comfortable
modifying BIOS settings through standard F10 access. BIOS configuration may be
designed to make the BIOS features easily accessible to all users from the
familiar Microsoft Windows environment.
Smart Card Security: This enables access to the smart card
configuration and enables smart card security features on systems equipped with
a smart card reader. Smart card readers can either be integrated or can be added
using the PC card slot on notebooks and USB on desktops and workstations.
Smart Card Reader: A smart card is an authentication
credential containing an embedded integrated circuit that can uniquely identify
the cardholder. The smart card is the same size as a credit card. Authenticating
the user before the operating system, pre-boot security can load without the
need for credentials stored on the system. This simplifies operating system
logon.
Device Access Manager: A common assumption with today's
client usage model is that users who are authorized to log on to a client and
access sensitive data are also able to copy or print that information. In
reality, this is not always the case. Companies may need to allow users to view
sensitive data, but restrict their ability to copy or print that data. Device
access manager solves that problem.
Creating a secure system involves looking at all areas of
vulnerability and creating solutions to address each of those areas.
Disk Sanitizer: It helps to protect the data from
unauthorized access by completely removing it from the hard drive. It eliminates
the need to purchase third-party software to erase hard disk data. This feature
is perfect for recycled equipment, planning for lease expiration, and
preparation ahead of a service event as it permanently destroys data.
TPM-Enhanced DriveLock: Hard drive protected by an
automatically created, strong, random password makes it more transparent and
easier to use. DriveLock password protected in TPM hardware improves security by
requiring users to authenticate before accessing the hard drive and without the
need to memorize another password.
Privacy Filter: This ensures that only the relevant person
can view displayed and confidential data. The security filter narrows the
viewing angle in your notebook display with no blurring or image distortion so
that screen data is visible only to the user, thus people on either side see a
dark, blank screen.
P Raghuraman, country
manager, Business Notebooks, Personal Systems Group, HP India
maildqindia@cybermedia.co.in