A breakthrough in integrated
endpoint security
Threat containment advantages across the organization
Endpoint
Protection
- Prevents phishing and ransomware from corrupting PCs or moving laterally
- Patch management compensating control
- CPU acceleration maintains app performance
SOC
Efficiency
- Fewer high-priority tickets and false positives
- Less endpoint remediation
- High fidelity visibility and threat intelligence
User
Experience
- Work without worry; open email attachments with confidence
- Reduce “spot the phishing” exercises
- No proxy delays or changes to application behavior
Key components of threat containment technology
Micro-virtual
Machines
- Per-task isolation of potentially risky activity
- Hardware-enforced attack surface reduction
- Secure web browser
Isolated Introspection
- “Safe Space” malware execution sandbox
- Realistic environment provides superior forensics of malware behavior
- Identifies previously unseen attack techniques and combinations
Analytics and
Reporting
- Centralized cloud or on-premises policy and event management
- Detailed per-event threat intel reports, including MITRE ATT&CK mapping
- Integrations via STIX/TAXII
Threat containment products for any environment
HP Sure Click
Enterprise
Maximum flexibility to satisfy the most demanding requirements
- Threat containment, credential protection, and secure browser
- Enterprise-class policies, RBAC, and integrations
- On-premises or cloud-based management
Simplified policy management for smaller organizations or less complex systems
HP Wolf Pro Security’s Next Generation Antivirus is rated as one of the best Windows Antivirus Software for Business users by AV-Test, a leading independent IT security research institute.
Our superb suite provides a comprehensive layered security solution leveraging our isolation technology and fortifies against a wide range of cyberthreats.
- Threat containment, credential protection, and optional NGAV
- Simplified policy constructs designed for security non-experts
- Cloud-based management
Compare capabilities
HP Wolf Security Platform
Hardware-Enforced Threat Containment
Browser Isolation
Credential Protection
Threat Containment Policy Configuration
HP Wolf controller management
Next-Gen Anti-Virus
HP Wolf Pro Security
Enhanced protection that’s easy to reply and use.
Advanced
Standard
Standard
Basic
Cloud
Optional
HP Sure Click Enterprise
Robust, custom security for complex organizations.
Advanced
Advanced
Advanced
Advanced
Cloud or On-Premises
Customer Choice
A simpler, more secure privileged user experience
Reduces
Risk
- Isolates sensitive data from compromises with hardware-enforced micro-virtualization
- Drastically reduces the attack surface area for privileged access
- Safeguards against keylogging, screen capture, memory tampering, and man-in-the-middle attacks
Improves User
Experience
- Enables a single workstation for privileged, non-privileged, and personal activity
- Allows IT teams to work without concern that they will facilitate a spear-phishing attack
- Maintains consistent user experience across applications
Streamlines IT
- Lowers costs and IT overhead by consolidating privileged workstations per user
- Eliminates additional PAW endpoint controls
- Complements and integrates with popular PAM solutions
Key capabilities of HP Sure Access Enterprise
Session Isolation
- Per-session isolated virtual space for each remote access session
- Supports policies locked to specific workstations
- Supports most business-class Intel CPUs
- Supports HP and non-HP PCs
Application Support
- RDP
- Citrix ICA
- SSH
- Web Portal (HTML5)
Management
- Centralized policy control and logging
- Full audit trail of privileged access to support primary or compensating control
- Tamper-proof logging
The HP difference: HP Wolf Connect
The problem
IT is unable to manage a PC fleet when powered down, not connected to the internet, or unable to boot.
The solution
HP Protect and Trace with Wolf Connect allows IT to use a highly resilient remote connection via low-bandwidth, low-power cellular technology to find, lock and erase PCs even if they are disconnected from the Internet, powered down, or unable to boot.
Asset management
Data security
Remotely lock PCs at BIOS level to secure data
Financial risk
management
Decrease equipment loss to drive higher ROI from DaaS or leasing offerings
Find my PC
Assist users whose PCs has been lost or stolen
Sustainable device
lifecycle
Manage devices from deployment to retirement, re-issue or recycle
Audit & compliance
Efficiently satisfy data and asset management controls
Detailed
documentation
Dive deeper into HP Wolf Security technologies with our comprehensive documentation library.
See HP Wolf Security in
action
Take a tour of our world-class security solutions, guided by an HP Wolf Security specialist.
Disclaimers
- HP Wolf Security for Business requires Windows 10 or 11 Pro and higher, includes various HP security features and is available on HP Pro, Elite, RPOS and Workstation products. See product details for included security features.
- HP Sure Access Enterprise requires Windows 10 Pro or Enterprise. HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service or the HP Limited Warranty provided with your HP Product. For full system requirements, please visit www.hpdaas.com/requirements.
- HP Wolf Protect and Trace is available on select HP 600, 800, 1000, Windows based Elite Dragonfly Laptops, select 800 desktops, and Z1 G8 Workstations and will function when the device is powered on and connected to the Internet. HP Wolf Protect & Trace requires HP TechPulse to be installed by customer manually via a one-click download at hp.com/premium-plus or by providing consent at the time of your hardware’s first boot, which enables HP to install HP TechPulse to collect information related to the Device. HP TechPulse is a telemetry and analytics platform that provides critical data around devices and applications and is not sold as a standalone service. HP TechPulse follows stringent GDPR privacy regulations and is ISO27001, ISO27701, ISO27017 and SOC2 Type2 certified for Information Security. Internet access with connection to TechPulse portal is required. For full system requirements, please visit http://www.hpdaas.com/requirements