Contact Us


Defend against cyber attacks without changing user behavior or increasing IT's workload with a multi-layered endpoint protection security service.

HP Wolf Security logo.

HP Wolf Security logo.

Invisible layers of protection

Protect data, devices and employee credentials with reinforcing layers of security monitored by certified HP Security Experts.

A protection-first approach

A multi-layered defense with award-winning, next-gen antivirus3 and industry-leading isolation4 technologies.


Enterprise-grade technology

Secure endpoints with trusted technology that’s been adapted to address the needs of mid-sized business and enterprise needing additional security expertise.


Worry-free endpoint threat monitoring

Certified HP Security Experts monitor and manage your endpoint fleet protection, freeing your IT to focus on more strategic projects.

Simplified endpoint security management

Benefit from an advanced security service, including actionable insights, without the complexity or need for in-house
expertise. Keep your IT focused on more strategic business initiatives instead of responding to security breaches.

Comprehensive and worry-free threat monitoring

Reduce the burden on IT and free resources to focus on strategic projects instead of monitoring security threats. With HP Wolf Pro Security,2 a managed cloud service, certified security experts provide ongoing management of the solution.

Expertly managed by certified security professionals

Help protect yourself against future attacks with device protection monitoring, and forensic threat intelligence and analysis by the security experts on our managed service team.

Timely and actionable analytics and insights

Monitor the security of your devices from the HP Wolf Security Controllers5 dashboard and receive real-time reports and alerts about unprotected devices and insights on attempted threats.

Keep employees productive

Empower employee productivity with transparent protection for the applications they prefer without restrictions, or fear of compromising their data, credentials or network.

  • Invisible layers of protection

    Help protect employees from malware and phishing attacks without creating barriers to their daily productivity with transparent protection that works behind the scenes.

  • Freedom to work uninterrupted

    Give employees the freedom to work unrestricted with full functionality to securely read, edit, save and print Microsoft Office and PDF documents.

What’s included in the HP Wolf Pro Security Service:1

Advanced deep learning anti-malware protection3

  • Detection of both known and previously unseen threats
  • Static malware files and file-less threat protection
  • Cloud-based reputation analysis of files
  • Detects malware evasion techniques
  • No signature updates required

Real-time threat isolation protection4

  • Email attachment isolation
  • Chat link and file sharing protection
  • Protection from documents sent by phishing emails
  • File download protection
  • Corporate website whitelisting support for IT

Credential theft protection4

  • Prevents credential theft by alerting and blocking users from sharing login details on websites
  • Allows users to login as usual to known safe sites
  • Blocks users from entering credentials on known malicious sites
  • Warns users against entering credentials on unknown and low-reputation sites

Security analytics and reporting5

  • Unified dashboard to view malware prevention, isolated threats and credentials phishing prevented
  • Real-time views and reports of quarantined items, threat activity, including full kill-chain analysis mapped to the MITRE ATT&CK™ framework6
  • View policy, trusted sites and exclusions/whitelist settings
  • Direct syslog integration to your existing SIEM

Monitored & managed by certified HP Security Experts

  • Ongoing monitoring and analysis of threat event activity and device protection status
  • Provide guidance on actions associated with prevented threats and configuration issues for unprotected devices
  • Centralized policy-based administration​ and setting management
  • Host and maintain the HP Wolf Security Controller5


Security Brief

Learn more about HP Wolf Pro Security with this 2-page overview of the service.



The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

  1. HP Wolf Pro Security Service planned to be available in Fall 2021. HP Wolf Pro Security Service requires Windows 10 Pro or Enterprise version 1909 or later and Microsoft Internet Explorer, Google Chrome, or Microsoft Edge (Chromium) are supported.  HP Wolf Pro Security Service is sold separately. HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service or the HP Limited Warranty provided with your HP Product. For full system requirements, please visit
  2. Based on HP’s internal analysis of isolation backed, deep learning endpoint security services including SaaS and managed services. Most advanced based on application isolation and deep learning endpoint protection on Windows 10 PCs as of March 2020.
  3. HP Sure Sense Pro is included with HP Proactive Security. For system requirements, please visit
  4. HP Sure Click Pro is included with HP Proactive Security requires Windows 10 Pro or Enterprise and Microsoft Internet Explorer, Google Chrome, Chromium, Mozilla Firefox and new Edge are supported. Supported attachments include Microsoft Office (Word, Excel, PowerPoint) and PDF files, when Microsoft Office or Adobe Acrobat are installed.
  5. HP Wolf Security Controller is not available as a standalone product and required HP Wolf Pro Security Service. For full system requirements, please visit HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service or the HP Limited Warranty provided with your HP Product.
  6. MITRE does not claim ATT&CK enumerates all possibilities for the types of actions and behaviors documented as part of its adversary model and framework of techniques. Using the information contained within ATT&CK to address or cover full categories of techniques will not guarantee full defensive coverage as there may be undisclosed techniques or variations on existing techniques not documented by ATT&CK.

Intel, the Intel Logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

© 2021 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation