HP iPAQ Handheld Security Solutions
Overview..........................................................................................................................................................2
Security........................................................................................................................................................2
HP ProtectTools...............................................................................................................................................3
Using HP ProtectTools.................................................................................................................................3
Odyssey Client.................................................................................................................................................3
Biometric Fingerprint Reader (HP iPAQ hx2700 series only)...........................................................................4
Special issues related to security.....................................................................................................................4
Recovering from a locked device.................................................................................................................5
Passphrases ................................................................................................................................................5
Performance considerations related to data encryption...............................................................................5
Network Connections.......................................................................................................................................6
Virtual Private Network and Wired Equivalency Privacy ..............................................................................6
Wi-Fi Protected Access (WPA) and TKIP/AES ................................................................................................6
Wireless fidelity (Wi-Fi) ................................................................................................................................7
Wi-Fi hotspots..............................................................................................................................................7
WLAN standards..........................................................................................................................................7
Additional Security Solutions ...........................................................................................................................8
Terminology .....................................................................................................................................................9
For more information......................................................................................................................................10
Call to action ..................................................................................................................................................10