Lenovo ThinkPad R400 User Manual - Page 25

Browse online or download pdf User Manual for Desktop Lenovo ThinkPad R400. Lenovo ThinkPad R400 28 pages. (bulgarian) setup guide
Also for Lenovo ThinkPad R400: Initial Setup (2 pages), Setup Manual (2 pages), Brochure (4 pages), Specifications (4 pages), Deployment Manual (44 pages), Brochure (4 pages), Notice (24 pages), Notice (1 pages), Deployment Manual (40 pages), Deployment Manual (36 pages), (Spanish) Setup Poster (2 pages), (Portuguese) Setup Poster (2 pages), (Portuguese) Setup Poster (2 pages), (Italian) Setup Poster (2 pages), (German) Setup Poster (2 pages), (Dutch) Setup Poster (2 pages), (Finnish) Setup Poster (2 pages), (Danish) Setup Poster (2 pages), (Danish) Setup Poster (2 pages), (Russian) Setup Poster (2 pages), (Romanian) Setup Poster (2 pages), Setup Poster (2 pages), Setup Poster (2 pages), Setup Poster (2 pages), Setup Poster (2 pages), Setup Poster (2 pages)

Lenovo ThinkPad R400 User Manual
Wireless security features
Advances in wireless technology require that we manage your security more reliably than ever. Therefore,
Lenovo has extended its Embedded Security Subsystem called the Trusted Platform Module (TPM) to
encompass virtually all of our ThinkPad® and desktop computer lines. This security subsystem helps
protect data, hardware, network access and communications - both wired and wireless - on select
ThinkPad and desktop PCs.
The Embedded Security Subsystem provides hardware-based protection of critical security information,
including passwords, encryption keys, and electronic credentials. It also helps identify computer users
involved in transactions, and helps establish that data transmissions are authentic, confidential and intact.
Client Security Solution provides enhanced security for both wired and wireless networks. For both types of
network, the Client Security Solution and TPM ensure data confidentiality and availability by providing a
hardware- and software-based architecture for better protection of the sensitive keys, identity information,
and confidential data. Also, for wireless networks the TPM hardware provides enhanced authentication and
session confidentiality by concealing authentication credentials for industry-standard 802.1x protocols and
Cisco LEAP.
For more information on wireless security offerings, click the following link:
http://www.pc.ibm.com/us/think/thinkvantagetech/security.html