HP 2015 Sustainability Report

Introduction

Environment

Society

Integrity

About this report

We also offer customers HP JetAdvantage Security Manager, 3 an industry-leading printer security compliance solution. 4 This technology enables a company’s IT staff to establish and maintain security policies and features, including by closing ports, disabling access protocols, auto-erasing files, and more. Upon reboot, the HP Instant-On Security feature checks and resets any impacted settings automatically to bring devices into compliance with the organization’s policy. HP JetAdvantage Security Manager also offers auto-discovery of devices to make it easier to find and add printers to manage. Personal systems Data is at the heart of every business, and HP technology helps our customers ensure that data stored and shared via their personal systems is protected. We build a high level of security into our devices to make them less prone to cyberattacks. HP’s Client Security Software tools are fully integrated and preinstalled in HP commercial Elite and Pro series for out-of-the-box functionality. Our Basic Input/Output System (BIOS) secu- rity has protected the HP Elite line of PCs since 2006, and now provides the industry’s only self-healing BIOS technology, HP Sure Start. HP Drive Encryption technology and self-encrypting drives (SED’s) prevent unauthorized access to data. Ensuring that data is only accessible by its intended audience also requires robust identity-verification tech- nologies. HP includes enhanced identity and authentication technologies, such as secure Fingerprint Readers, Face Recognition, and Smart Card Readers on our Elite line of PCs. If a device is lost or stolen, HP Touchpoint Manager, a cloud-based management solution, enables users to find, lock, and securely erase any device.  Secure operations Our Cybersecurity Office drives HP’s efforts to protect our information systems from security threats and cyberattacks. This group provides and maintains the guidance, gov- ernance, resources, and vendor relationships necessary to keep our processes and sys- tems secure. The Office’s priorities include preventing unwanted access to and navigation through our information systems, ensuring the quick detection and containment of unwanted intrusions, and supporting the overall protection of HP’s critical assets, includ- ing our intellectual property and reputation, as well as data held for our customers. We strive to make the reporting of breaches to our systems easy and swift, and maintain the processes to address these accordingly when they arise. All related activities are moni- tored, tracked, and reported to the relevant leadership on a regular and ongoing basis.

1

126 HP 2015 Sustainability Report

www.hp.com/sustainability

Made with FlippingBook flipbook maker