Operating Instructions
Advances in wireless technology require that we manage your security more reliably than ever. Therefore, IBM has extended its
IBM Embedded Security Subsystem to encompass virtually all of our ThinkPad(R) and desktop computer lines. This security
subsystem helps protect data, hardware, network access and communications - both wired and wireless - on select ThinkPad and
desktop PCs.
The IBM Embedded Security Subsystem provides hardware-based protection of critical security information, including passwords,
encryption keys, and electronic credentials. It also helps identify computer users involved in transactions, and helps establish that
data transmissions are authentic, confidential and intact.
IBM Security and Privacy Services for wireless risk assessment and wireless solution design can help you assess the risks based
on your business needs, identify your information risk position, and integrate security strategies, policies, and architectures to help
you achieve your wireless e-business objectives. To effectively manage risk on an ongoing basis, organizations must have a sound
security strategy. By understanding threats and vulnerabilities at an early stage, we can help define the necessary scope and
features of your wireless e-business security infrastructure.
For more information on IBM's wireless security offerings, click the following link:
http://www.pc.ibm.com/us/think/thinkvantagetech/security.html
Wireless security features
1/1ページWirelesssecurityfeatures
2005/04/15mk:@MSITStore:C:¥DOCUME˜1¥tmurota¥LOCALS˜1¥Temp¥notesE1EF34¥WIRELESS.CHM::/wiresec.H...