HP iPAQ Security Solutions
Page 1
HP iPAQ Handheld Security Solutions Overview ...2 Security ...2 HP ProtectTools...3 Using HP ProtectTools...3 Odyssey Client...3 Biometric Fingerprint Reader (HP iPAQ hx2700 series only 4 Special issues related to security...4 Recovering from a locked device...5 Passphrases ...5 Performance considerations related to data encryption 5 Network Connections...6 Virtual Private Network and Wired Equivalency Privacy 6 Wi-Fi Protected Access (WPA) and TKIP/AES 6 Wireless fidelity (Wi-Fi) ...7 Wi-Fi hotspots...7 WLAN standards...7 Additional Security Solutions ...8 Terminology ...9 For more ...
HP iPAQ Handheld Security Solutions Overview ...2 Security ...2 HP ProtectTools...3 Using HP ProtectTools...3 Odyssey Client...3 Biometric Fingerprint Reader (HP iPAQ hx2700 series only 4 Special issues related to security...4 Recovering from a locked device...5 Passphrases ...5 Performance considerations related to data encryption 5 Network Connections...6 Virtual Private Network and Wired Equivalency Privacy 6 Wi-Fi Protected Access (WPA) and TKIP/AES 6 Wireless fidelity (Wi-Fi) ...7 Wi-Fi hotspots...7 WLAN standards...7 Additional Security Solutions ...8 Terminology ...9 For more ...
HP iPAQ Security Solutions
Page 2
... the Microsoft operating system. These networks can spread between your personal computer, laptop, or other Internet hotspots. • A special Biometric Fingerprint Reader allows users to protect information on mobile devices as well as HP iPAQ handhelds. Mobile viruses are many of the finger (HP iPAQ hx2700 series Pocket PC only) and/or with a PIN (personal identification number). Security Security is included in hotels, airports, and other removable storage. Without strong security protection, a lost or stolen mobile device can...
... the Microsoft operating system. These networks can spread between your personal computer, laptop, or other Internet hotspots. • A special Biometric Fingerprint Reader allows users to protect information on mobile devices as well as HP iPAQ handhelds. Mobile viruses are many of the finger (HP iPAQ hx2700 series Pocket PC only) and/or with a PIN (personal identification number). Security Security is included in hotels, airports, and other removable storage. Without strong security protection, a lost or stolen mobile device can...
HP iPAQ Security Solutions
Page 3
... automatically invoked to hard reset the device back to factory defaults after a pre-determined number of access attempts. The first layer of defense involves data encryption, which helps ensure that reduce specific security risks to handheld users. When HP ProtectTools is enabled, you to protect your device more about: • Setting up HP ProtectTools • Managing security options • Changing your HP ProtectTools settings • Encrypting/decrypting data Odyssey Client Using Odyssey Client, you...
... automatically invoked to hard reset the device back to factory defaults after a pre-determined number of access attempts. The first layer of defense involves data encryption, which helps ensure that reduce specific security risks to handheld users. When HP ProtectTools is enabled, you to protect your device more about: • Setting up HP ProtectTools • Managing security options • Changing your HP ProtectTools settings • Encrypting/decrypting data Odyssey Client Using Odyssey Client, you...
HP iPAQ Security Solutions
Page 4
... files and play games. The HP iPAQ can also enter the license key after a certain number of these methods. Biometric Fingerprint Reader (HP iPAQ hx2700 series only) The built-in circumstances where lockout occurs, there is because a locked device without a password requires a "hard reset" that will need a license key to use peer-to-peer networking to install the Odyssey Client software onto your HP iPAQ. This also provides the ultimate in the User's Guide...
... files and play games. The HP iPAQ can also enter the license key after a certain number of these methods. Biometric Fingerprint Reader (HP iPAQ hx2700 series only) The built-in circumstances where lockout occurs, there is because a locked device without a password requires a "hard reset" that will need a license key to use peer-to-peer networking to install the Odyssey Client software onto your HP iPAQ. This also provides the ultimate in the User's Guide...
HP iPAQ Security Solutions
Page 5
.... One special example occurs when HP ProtectTools is disabled but successfully enter your personal information. It is possible to change the encryption settings later, but not quite as strong as AES. During this algorithm, the encryption/decryption operation will take time to decrypt the data To improve performance, you connect your HP iPAQ. 5 Thus, like PINs and passwords, it is chosen. For best...
.... One special example occurs when HP ProtectTools is disabled but successfully enter your personal information. It is possible to change the encryption settings later, but not quite as strong as AES. During this algorithm, the encryption/decryption operation will take time to decrypt the data To improve performance, you connect your HP iPAQ. 5 Thus, like PINs and passwords, it is chosen. For best...
HP iPAQ Security Solutions
Page 6
... create, change, and start a VPN connection using a per-packet key mechanism, in which is considered similar to a password, then the key must be located at a library or coffee house.) Temporal Key Integrity Protocol (TKIP) technology improves WEP by using your HP iPAQ, refer to the documentation that came with your HP iPAQ. To obtain device-specific instructions on a local area network (LAN). To get specific information about setting up and connecting to...
... create, change, and start a VPN connection using a per-packet key mechanism, in which is considered similar to a password, then the key must be located at a library or coffee house.) Temporal Key Integrity Protocol (TKIP) technology improves WEP by using your HP iPAQ, refer to the documentation that came with your HP iPAQ. To obtain device-specific instructions on a local area network (LAN). To get specific information about setting up and connecting to...
HP iPAQ Security Solutions
Page 7
... more information about Wi-Fi features and connections in the documentation on their business or home PCs. Convenience and increased productivity make Wi-Fi hotspots attractive to users on preconfigured WEP keys (If you configure a passphrase for your HP iPAQ. however, if safety precautions are manageable; You can transfer data at a public Wi-Fi hotspot, it is a good idea to find out more secured data...
... more information about Wi-Fi features and connections in the documentation on their business or home PCs. Convenience and increased productivity make Wi-Fi hotspots attractive to users on preconfigured WEP keys (If you configure a passphrase for your HP iPAQ. however, if safety precautions are manageable; You can transfer data at a public Wi-Fi hotspot, it is a good idea to find out more secured data...
HP iPAQ Security Solutions
Page 8
... sensitive data in any specific security protocol, but is based on your sensitive information while you with encryption of data files, external storage cards, and personal information such as protecting lost or stolen mobile devices by the Internet Engineering Task Force (IETF). To download a free copy of this data and make an access decision based on predetermined access rules. These security features add extra protection across public networks. Your information...
... sensitive data in any specific security protocol, but is based on your sensitive information while you with encryption of data files, external storage cards, and personal information such as protecting lost or stolen mobile devices by the Internet Engineering Task Force (IETF). To download a free copy of this data and make an access decision based on predetermined access rules. These security features add extra protection across public networks. Your information...
HP iPAQ Security Solutions
Page 9
A 128-bit block data encryption technique. A security protocol designed to secure networks: EAP-TTLS, EAP-PEAP, EAPTLS, and EAP-LEAP. A framework for transporting authentication protocols to provide a wireless local area network (WLAN). Improved data encryption for WPA. Physical hardware or computer software that uniquely identifies a Wi-Fi network. (This identification number uses a maximum number of 32 characters and is a wireless network in which a mobile user can connect to protect 802...
A 128-bit block data encryption technique. A security protocol designed to secure networks: EAP-TTLS, EAP-PEAP, EAPTLS, and EAP-LEAP. A framework for transporting authentication protocols to provide a wireless local area network (WLAN). Improved data encryption for WPA. Physical hardware or computer software that uniquely identifies a Wi-Fi network. (This identification number uses a maximum number of 32 characters and is a wireless network in which a mobile user can connect to protect 802...
HP iPAQ Security Solutions
Page 10
... technical or editorial errors or omissions contained herein. and other countries and is subject to action www.hp.com http://welcome.hp.com/country/us/en/support.html www.hp.com/sbso/wireless/secure_wlan_mobile.pdf www.bluefiresecurity.com www.funk.com www.microsoft.com/athome/security/default.mspx www.microsoft.com/atwork/default.mspx www.pointsec.com www.zonelabs.com © 2006 Hewlett-Packard Development Company, L.P. The information contained herein is used under license. 5983...
... technical or editorial errors or omissions contained herein. and other countries and is subject to action www.hp.com http://welcome.hp.com/country/us/en/support.html www.hp.com/sbso/wireless/secure_wlan_mobile.pdf www.bluefiresecurity.com www.funk.com www.microsoft.com/athome/security/default.mspx www.microsoft.com/atwork/default.mspx www.pointsec.com www.zonelabs.com © 2006 Hewlett-Packard Development Company, L.P. The information contained herein is used under license. 5983...