Contact our sales team.
HP Wolf Security Products.
A breakthrough in integrated endpoint security.
Hardware and software work together to make you more secure and more productive.
HP Wolf Security1 takes a full-stack approach to securing the weakest links in your security architecture—your endpoints and users. Our advanced threat containment strategy combines unique, CPU-enforced isolation technology with security features embedded into motherboard hardware to form a fortress of protection most threats can’t penetrate.
Threat containment – An advanced approach to endpoint protection.
Threat Containment technology uses isolation based on micro-virtual machines to protect users and defeat phishing and other attack vectors NGAV and EDR solutions may let through. Malware can’t make its way around isolation measures because they are enforced by CPU hardware.
- Mitigates attacks from email attachments, web links, and USB drives
- Supported by AMD and Intel CPUs
- More than 18 billion clicks without a reported compromise
Threat containment – An advanced approach to endpoint protection.
Threat Containment technology uses isolation based on micro-virtual machines to protect users and defeat phishing and other attack vectors NGAV and EDR solutions may let through. Malware can’t make its way around isolation measures because they are enforced by CPU hardware.
- Mitigates attacks from email attachments, web links, and USB drives
- Supported by AMD and Intel CPUs
- More than 18 billion clicks without a reported compromise
- Prevents phishing and ransomware from corrupting PCs
- Patch management compensating control
- CPU acceleration maintains app performance
- Fewer high-priority tickets and false positives
- Less endpoint remediation
- High fidelity visibility and threat intelligence
- Work without worry – Open e-mail attachments with confidence
- Reduce “spot the phishing” exercises
- No proxy delays or changes to application behaviour
Micro-virtual machines.
- Per-task isolation of potentially risky activity
- Hardware-enforced attack surface reduction
- Secure web browser
Isolated introspection.
- “Safe Space” malware execution sandbox
- Realistic environment provides superior forensics of malware behaviour
- Identifies previously unseen attack techniques and combinations
Analytics and reporting.
- Centralised cloud or on-premises policy and event management
- Detailed per-event threat intel reports, including MITRE ATT&CK mapping
- Integrations via STIX/TAXII
HP Sure Click Enterprise.
Maximum flexibility to satisfy the most demanding requirements.
|
HP Wolf Pro Security.
Simplified policy management for smaller organisations or less complex systems.
|
HP Wolf Security Platform |
HP Wolf Pro Security.
Enhanced protection that’s easy to use.
|
HP Sure Click Enterprise.
Robust, custom security for complex organisations.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cyber criminals target privileged users with spear-phishing and other behaviour-based attacks to try and access sensitive data. HP Sure Access Enterprise2 uses endpoint isolation technology to defeat such attacks, protecting your privileged data and securing remote access sessions—even if a PC is compromised–with CPU-enforced micro-virtualisation. Your data stays safe and your systems remain available.
- IT System Administration
- Database & Applicated Elevated Privileged Access
- OT and IoT Administration
Cyber criminals target privileged users with spear-phishing and other behaviour-based attacks to try and access sensitive data. HP Sure Access Enterprise2 uses endpoint isolation technology to defeat such attacks, protecting your privileged data and securing remote access sessions—even if a PC is compromised–with CPU-enforced micro-virtualisation. Your data stays safe and your systems remain available.
- IT System Administration
- Database & Applicated Elevated Privileged Access
- OT and IoT Administration
- Isolates sensitive data from compromises with hardware-enforced micro-virtualisation
- Drastically reduces the attack surface area for privileged access
- Safeguards against keylogging, screen capture, memory tampering, and man-in-the-middle attacks
- Enables a single workstation for privileged, non-privileged, and personal activity
- Allows IT teams to work without concern that they will facilitate a spear-phishing attack
- Maintains consistent user experience across applications
- Lowers costs and IT overhead by consolidating privileged workstations per user
- Eliminates additional PAW endpoint controls
- Complements and integrates with popular PAM solutions
Session isolation.
- Per-session isolated virtual space for each remote access session
- Supports policies locked to specific workstations
- Supports most business-class Intel CPUs
- Supports HP and non-HP PCs
Application support.
- RDP
- Citrix ICA
- SSH
- Web Portal (HTML5)
Management.
- Centralised policy control and logging
- Full audit trail of privileged access to support primary or compensating control
- Tamper-proof logging
Mitigate risk from lost or stolen PCs in remote and hybrid workplaces.
HP Wolf Protect and Trace3 dramatically reduces the risk of data falling into the wrong hands when a PC is lost or stolen. A missing laptop can be located, temporarily locked, or erased remotely, relieving IT and security teams of a major source of time and concern. With value pricing and cloud-based management, HP Wolf Protect and Trace is ideal for small to mid-sized organisations with limited IT resources.
- Quickly locate missing PCs
- Lock and secure data on missing PCs
- Wipe data on unrecoverable PCs
Mitigate risk from lost or stolen PCs in remote and hybrid workplaces.
HP Wolf Protect and Trace3 dramatically reduces the risk of data falling into the wrong hands when a PC is lost or stolen. A missing laptop can be located, temporarily locked, or erased remotely, relieving IT and security teams of a major source of time and concern. With value pricing and cloud-based management, HP Wolf Protect and Trace is ideal for small to mid-sized organisations with limited IT resources.
- Quickly locate missing PCs
- Lock and secure data on missing PCs
- Wipe data on unrecoverable PCs
- Lock or wipe missing PCs remotely to prevent data theft
- Create more time for effective incident response
- Reduce or eliminate breach notification requirements with a compensating control
- Find missing laptops quickly
- Alleviate frustration of lengthy IT support tickets or PC replacement processes
- Support remote work and business travel with elite security
- Eliminate time-consuming tickets related to missing PCs or device replacement
- Enjoy simple, cloud-based management for internal or outsourced/MSSP operations
- Save even more with the Active Care bundle option
Quickly locate PCs.
- Geo-location instantly identifies a PCs current whereabouts
- Broad international coverage
- Hardware-enforced PC agent persistence
Temporarily lock PCs.
- Remotely disable PC login and data access
- Protect data while a PC is in the process of being located and recovered
- Eliminate the risk and uncertainty of possible data theft
Wipe PC data.
- Remotely erase all data on PCs that have been deemed unrecoverable
- Threshold Cryptographic Authorization requires multiple IT approvals to lock or erase PCs
Maximum connectivity tailored to how you work. Remain productive wherever you are with these ultra-light, highly-secure notebooks with advanced security software pre-installed.
Modern design for today’s world of work. This slim and light PC gives you the performance, security and durability you need in the hybrid workplace.
Professional productivity and security meet compact size and ease of manageability in this robust mini PC.
A powerful business notebook delivers maximum agility in an impressive design without compromising on performance or security.
A reliable notebook specially designed for companies and professional users with a powerful processor, generous RAM and a brilliant Full HD display.
Want to know more about HP Wolf Security?
Just get in touch.
*Mandatory field
If you’d like to know more about how we handle your personal data, please read our Privacy Policy.
Subject to change.
1 HP Wolf Security for Business requires Windows 10 or 11 Pro and higher, includes various HP security features and is available on HP Pro, Elite, RPOS and Workstation products. See product details for included security features.
2 HP Sure Access Enterprise requires Windows 10 Pro or Enterprise. HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service or the HP Limited Warranty provided with your HP Product. For full system requirements, please visit www.hpdaas.com/requirements.
3 HP Wolf Protect and Trace is available on select HP 600, 800, 1000, Windows based Elite Dragonfly Laptops, select 800 desktops, and Z1 G8 Workstations and will function when the device is powered on and connected to the internet. HP Wolf Protect & Trace requires HP TechPulse to be installed by customer manually via a one-click download at hp.com/premium-plus or by providing consent at the time of your hardware’s first boot, which enables HP to install HP TechPulse to collect information related to the Device. HP TechPulse is a telemetry and analytics platform that provides critical data around devices and applications and is not sold as a standalone service. HP TechPulse follows stringent GDPR privacy regulations and is ISO27001, ISO27701, ISO27017 and SOC2 Type2 certified for Information Security. Internet access with connection to TechPulse portal is required. For full system requirements, please visit http://www.hpdaas.com/requirements