© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Instructional Technology, SBBC Wireless Cart Strategies Effective Management.
New Data Regulation Law 201 CMR TJX Video.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Networking and Operating Systems. Networking What is it? Things that are hooked together. Computer Network- Computers that are connected together.
Desktop Security After completing this lesson, you should be able to do the following: Describe the different types of software and hardware attacks List.
1.1 System Performance Security Module 1 Version 5.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
LAN Switching and Wireless – Chapter 2
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Switch LAN Switching and Wireless – Chapter 2.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicBSCI Module 6 1 Basic Switch Concept Prepared by: Akhyari Nasir Resources form Internet.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Chapter 2 Securing Network Server and User Workstations.
Topic 5: Basic Security.
Desktop Security: Making Sure Your Office Environment is Secure.
Network Security & Accounting
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
Instructional Technology, SBBC Wireless Cart Strategies Effective Management.
Week I Security and Mobile Devices. Overview Purpose of Security Application to Mobile Devices Threats to Mobile Devices Security and the Blackberry Threats.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Computer Security Sample security policy Dr Alexei Vernitski.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Unit 4- Networks.  Identify what a network is.  Describe the benefits of a network.  Identify ways to connect to a network.  Compare & contrast a.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
LAN Switching and Wireless – Chapter 2
Security Issues in Information Technology
Slide Template for Module 4 Data Storage, Backup, and Security
Chapter 7. Identifying Assets and Activities to Be Protected
East Carolina University
Security in Networking
CYB 110 Competitive Success/snaptutorial.com
LAN Switching and Wireless – Chapter 2
Unit 4 IT Security Kerris Davies.
LAN Switching and Wireless – Chapter 2
Chapter # 3 COMPUTER AND INTERNET CRIME
Recovery cards and their utilization in student’s laboratory
The bios.
Presentation transcript:

© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control

© 2013 Toshiba Corporation 2 Toshiba Device Access Control Preventing unauthorized system access is paramount to maintaining security. To help you do that, Toshiba offers companies a Device Access Control utility that allows the IT department, to lock specific devices, ports or limit its functions, preventing confidential data from being copied from systems to external storage devices or private data from being copied to business laptops. This reduces the risk of data theft and helps reduce the threat of viruses coming from private devices.

© 2013 Toshiba Corporation 3 Safeguard against the unauthorised copying and transmission of data. Defence against data theft and corruption from within your organization. Help to prevent the spread of viruses and malicious software. Toshiba Device Access Control

© 2013 Toshiba Corporation 4 Selectively disable devices or device functions. Disc Burning – Can set access rights to each computer - allowing a specified number of employees the ability to write to optical media. Use of Ports – Can specify which ports the employee can use on their computer. Webcam Use – Can set which computers have their webcams enabled or disabled. Network device  Can set the computer to disable the wired LAN, wireless LAN and/or Bluetooth.  IT Administrator can send policy file to a remote computer by .  Command line policy files can be deployed with remote management systems or login script.  Policy files are protected with a password and/or verify the model number and serial number of the target computer. What can Device Access Control do for you?

© 2013 Toshiba Corporation 5 How to Enable Toshiba Device Access Control Device Access Control can be accessed & configured from BIOS. It is available within “Security” Option. But without registering the Supervisor password it will not be available under “Security” option. How to Enable: 1.Press & Hold “F2” then switch on the laptop PC. 2.Choose “Security” and register a Supervisor Password.

© 2013 Toshiba Corporation 6 3. After Registering the Supervisor password, 4 Menus will enable.

© 2013 Toshiba Corporation 7 Device Access Control – Menu Items

© 2013 Toshiba Corporation 8 Device Boot Control – Menu Items