HP Wolf Security Products
A breakthrough in integrated
endpoint security
Threat containment advantages across the organisation
Endpoint
Protection
- Prevents phishing and ransomware from corrupting PCs or moving laterally
- Patch management compensating control
- CPU acceleration maintains app performance
SOC
Efficiency
- Fewer high-priority tickets and false positives
- Less endpoint remediation
- High fidelity visibility and threat intelligence
User
Experience
- Work without worry; open email attachments with confidence
- Reduce “spot the phishing” exercises
- No proxy delays or changes to application behavior
Key components of threat containment technology
Micro-virtual
Machines
- Per-task isolation of potentially risky activity
- Hardware-enforced attack surface reduction
- Secure web browser
Isolated Introspection
- “Safe Space” malware execution sandbox
- Realistic environment provides superior forensics of malware behavior
- Identifies previously unseen attack techniques and combinations
Analytics and
Reporting
- Centralised cloud or on-premises policy and event management
- Detailed per-event threat intel reports, including MITRE ATT&CK mapping
- Integrations via STIX/TAXII
Threat containment products for any environment
HP Sure Click
Enterprise
Maximum flexibility to satisfy the most demanding requirements
- Threat containment, credential protection, and secure browser
- Enterprise-class policies, RBAC, and integrations
- On-premises or cloud-based management
HP Wolf Pro
Security
Simplified policy management for smaller organisations or less complex systems
- Threat containment, credential protection, and optional NGAV
- Simplified policy constructs designed for security non-experts
- Cloud-based management
Compare capabilities
HP Wolf Security Platform
Hardware-Enforced Threat Containment
Browser Isolation
Credential Protection
Threat Containment Policy Configuration
HP Wolf Controller Management
Next-Gen Anti-Virus
HP Wolf Pro Security
Enhanced protection that’s easy to reply and use.
Advanced
Standard
Standard
Basic
Cloud
Optional
HP Sure Click Enterprise
Robust, custom security for complex organisations.
Advanced
Advanced
Advanced
Advanced
Cloud or On-Premises
Customer Choice
A simpler, more secure privileged user experience
Reduces
Risk
- Isolates sensitive data from compromises with hardware-enforced micro-virtualisation
- Drastically reduces the attack surface area for privileged access
- Safeguards against keylogging, screen capture, memory tampering, and man-in-the-middle attacks
Improves User
Experience
- Enables a single workstation for privileged, non-privileged, and personal activity
- Allows IT teams to work without concern that they will facilitate a spear-phishing attack
- Maintains consistent user experience across applications
Streamlines IT
- Lowers costs and IT overhead by consolidating privileged workstations per user
- Eliminates additional PAW endpoint controls
- Complements and integrates with popular PAM solutions
Key capabilities of HP Sure Access Enterprise
Session Isolation
- Per-session isolated virtual space for each remote access session
- Supports policies locked to specific workstations
- Supports most business-class Intel CPUs
- Supports HP and non-HP PCs
Application Support
- RDP
- Citrix ICA
- SSH
- Web Portal (HTML5)
Management
- Centralised policy control and logging
- Full audit trail of privileged access to support primary or compensating control
- Tamper-proof logging
A more secure and productive remote workplace
Reduces
Risk
- Lock or wipe missing PCs remotely to prevent data theft
- Create more time for effective incident response
- Reduce or eliminate breach notification requirements with a compensating control
Improves User
Experience
- Find missing laptops quickly
- Alleviate frustration of lengthy IT support tickets or PC replacement processes
- Support remote work and business travel with elite security
Streamlines IT
- Eliminate time-consuming tickets related to missing PCs or device replacement
- Enjoy simple, cloud-based management for internal or outsourced/MSSP operations
- Save even more with the HP Premium+ Support (formerly Active Care) bundle option
Key capabilities of HP Wolf Protect and Trace
Quickly locate PCs
- Geo-location instantly identifies a PCs current whereabouts
- Broad international coverage
- Hardware-enforced PC agent persistence
Temporarily lock PCs
- Remotely disable PC login and data access
- Protect data while a PC is in the process of being located and recovered
- Eliminate the risk and uncertainty of possible data theft
Wipe PC data
- Remotely erase all data on PCs that have been deemed unrecoverable
- Threshold Cryptographic Authorisation requires multiple IT approvals to lock or erase PCs
Detailed
documentation
Dive deeper into HP Wolf Security technologies with our comprehensive documentation library.
See HP Wolf Security in
action
Take a tour of our world-class security solutions, guided by an HP Wolf Security specialist.
Disclaimers
- HP Wolf Security for Business requires Windows 10 or 11 Pro and higher, includes various HP security features and is available on HP Pro, Elite, RPOS and Workstation products. See product details for included security features.
- HP Sure Access Enterprise requires Windows 10 Pro or Enterprise. HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service or the HP Limited Warranty provided with your HP Product. For full system requirements, please visit www.hpdaas.com/requirements.
- HP Wolf Protect and Trace is available on select HP 600, 800, 1000, Windows based Elite Dragonfly Laptops, select 800 desktops, and Z1 G8 Workstations and will function when the device is powered on and connected to the Internet. HP Wolf Protect & Trace requires HP TechPulse to be installed by customer manually via a one-click download at hp.com/premium-plus or by providing consent at the time of your hardware’s first boot, which enables HP to install HP TechPulse to collect information related to the Device. HP TechPulse is a telemetry and analytics platform that provides critical data around devices and applications and is not sold as a standalone service. HP TechPulse follows stringent GDPR privacy regulations and is ISO27001, ISO27701, ISO27017 and SOC2 Type2 certified for Information Security. Internet access with connection to TechPulse portal is required. For full system requirements, please visit http://www.hpdaas.com/requirements
Product images are for illustration purposes only, product availability and colours may vary by country.
© HP Development Company, L.P. The Information contained herein is subject to change without notice. Warranties for HP products and services are set out in the express warranty statements accompanying such products and services. In addition, our products and services come with guarantees that cannot be excluded under the Australian Consumer Law. Subject to the foregoing, nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.