Request a demo

Contact us

HP Wolf Security Products

A breakthrough in integrated 
endpoint security

Hardware and software work together to make you more secure and more productive

HP Wolf Security1 takes a full-stack approach to securing the weakest links in your security architecture—your endpoints and users. Our advanced threat containment strategy combines unique, CPU-enforced isolation technology with security features embedded into motherboard hardware to form a fortress of protection most threats can’t penetrate.

Request a demo

Request a demo

Contact us

Unique malware prevention

Threat containment: an advanced approach to endpoint protection

Threat containment: an advanced approach to endpoint protection

Threat Containment technology uses isolation based on micro-virtual machines to protect users and defeat phishing and other attack vectors NGAV and EDR solutions may let through. Malware can’t make its way around isolation measures because they are enforced by CPU hardware.

  • Mitigates attacks from email attachments, web links, and USB drives
  • Supported by AMD and Intel CPUs
  • More than 18 billion clicks without a reported compromise

Endpoint Isolation Technology Brief

Additional Resources

Unique Malware Prevention

Threat containment advantages across the organization

Endpoint

Protection 

  • Prevents phishing and ransomware from corrupting PCs or moving laterally
  • Patch management compensating control
  • CPU acceleration maintains app performance

SOC

Efficiency

  • Fewer high-priority tickets and false positives
  • Less endpoint remediation
  • High fidelity visibility and threat intelligence

User

Experience

  • Work without worry; open email attachments with confidence
  • Reduce “spot the phishing” exercises
  • No proxy delays or changes to application behavior

Key components of threat containment technology 

Micro-virtual
Machines

  • Per-task isolation of potentially risky activity 
  • Hardware-enforced attack surface reduction 
  • Secure web browser

Isolated Introspection

  • “Safe Space” malware execution sandbox 
  • Realistic environment provides superior forensics of malware behavior 
  • Identifies previously unseen attack techniques and combinations

Analytics and
Reporting

  • Centralized cloud or on-premises policy and event management 
  • Detailed per-event threat intel reports, including MITRE ATT&CK mapping 
  • Integrations via STIX/TAXII

Threat containment products for any environment

HP Sure Click

Enterprise 

Maximum flexibility to satisfy the most demanding requirements 

 

  • Threat containment, credential protection, and secure browser 
  • Enterprise-class policies, RBAC, and integrations 
  • On-premises or cloud-based management

View the datasheet

All HP Sure Click Enterprise Documentation

View HP Sure Click Enterprise infographic

HP Wolf Pro

Security 

Simplified policy management for smaller organizations or less complex systems 

 

  • Threat containment, credential protection, and optional NGAV 
  • Simplified policy constructs designed for security non-experts  
  • Cloud-based management

View the datasheet

All HP Wolf Pro Security Documentation

View HP Wolf Security quick facts

Compare capabilities

HP Wolf Security Platform

 

 

Hardware-Enforced Threat Containment

Browser Isolation

Credential Protection

Threat Containment Policy Configuration

HP Wolf Controller Management

Next-Gen Anti-Virus

HP Wolf Pro Security

Enhanced protection that’s easy to reply and use.

Advanced

Standard

Standard

Basic

Cloud

Optional

Read the Datasheet

Read the Solution Brief

All HP Wolf Pro Security Documentation

HP Sure Click Enterprise

Robust, custom security for complex organizations.

Advanced

Advanced

Advanced

Advanced

Cloud or On-Premises

Customer Choice

Read the Datasheet

Read the Solution Brief

HP Sure Click Enterprise Documentation

HP Sure Access Enterprise

Improved protection and user experience for Privileged Access Workstations

Improved protection and user experience for Privileged Access Workstations

Cyber criminals target privileged users with spear-phishing and other behavior-based attacks to try and access sensitive data. HP Sure Access Enterprise2 uses endpoint isolation technology to defeat such attacks, protecting your privileged data and securing remote access sessions—even if a PC is compromised–with CPU-enforced micro-virtualization. Your data stays safe and your systems remain available.

  • IT System Administration
  • Database & Applicated Elevated Privileged Access
  • OT and IoT Administration

Download the datasheet

Read the Solution Brief 

View the Benefits of HP Sure Access Enterprise

HP Sure Access Enterprise

A simpler, more secure privileged user experience

Reduces

Risk

  • Isolates sensitive data from compromises with hardware-enforced micro-virtualization
  • Drastically reduces the attack surface area for privileged access
  • Safeguards against keylogging, screen capture, memory tampering, and man-in-the-middle attacks

Improves User

Experience

  • Enables a single workstation for privileged, non-privileged, and personal activity
  • Allows IT teams to work without concern that they will facilitate a spear-phishing attack
  • Maintains consistent user experience across applications

Streamlines IT

  • Lowers costs and IT overhead by consolidating privileged workstations per user
  • Eliminates additional PAW endpoint controls
  • Complements and integrates with popular PAM solutions

Key capabilities of HP Sure Access Enterprise

Session Isolation

  • Per-session isolated virtual space for each remote access session
  • Supports policies locked to specific workstations
  • Supports most business-class Intel CPUs
  • Supports HP and non-HP PCs

Application Support

  • RDP
  • Citrix ICA
  • SSH
  • Web Portal (HTML5)

Management 

  • Centralized policy control and logging
  • Full audit trail of privileged access to support primary or compensating control
  • Tamper-proof logging

HP Wolf Protect and Trace

Mitigate risk from lost or stolen PCs in remote and hybrid workplaces

Mitigate risk from lost or stolen PCs in remote and hybrid workplaces

HP Wolf Protect and Trace3 dramatically reduces the risk of data falling into the wrong hands when a PC is lost or stolen. A missing laptop can be located, temporarily locked, or erased remotely, relieving IT and security teams of a major source of time and concern. With value pricing and cloud-based management, HP Wolf Protect and Trace is ideal for small to mid-sized organizations with limited IT resources.  

  • Quickly locate missing PCs
  • Lock and secure data on missing PCs
  • Wipe data on unrecoverable PCs

Download the datasheet

Read the Solution Brief

HP Wolf Protect and Trace

A more secure and productive remote workplace

Reduces

Risk

  • Lock or wipe missing PCs remotely to prevent data theft
  • Create more time for effective incident response
  • Reduce or eliminate breach notification requirements with a compensating control

Improves User

Experience

  • Find missing laptops quickly
  • Alleviate frustration of lengthy IT support tickets or PC replacement processes
  • Support remote work and business travel with elite security

Streamlines IT

  • Eliminate time-consuming tickets related to missing PCs or device replacement
  • Enjoy simple, cloud-based management for internal or outsourced/MSSP operations
  • Save even more with the HP Premium+ Support (formerly Active Care) bundle option

Key capabilities of HP Wolf Protect and Trace

Quickly locate PCs

  • Geo-location instantly identifies a PCs current whereabouts
  • Broad international coverage
  • Hardware-enforced PC agent persistence

Temporarily lock PCs

  • Remotely disable PC login and data access
  • Protect data while a PC is in the process of being located and recovered
  • Eliminate the risk and uncertainty of possible data theft

Wipe PC data

  • Remotely erase all data on PCs that have been deemed unrecoverable
  • Threshold Cryptographic Authorization requires multiple IT approvals to lock or erase PCs

Detailed
documentation

Dive deeper into HP Wolf Security technologies with our comprehensive documentation library.

View all documentation

See HP Wolf Security in
action

Take a tour of our world-class security solutions, guided by an HP Wolf Security specialist.

Request a demo

Disclaimers

The information contained herein is subject to change without notice.
  1. HP Wolf Security for Business requires Windows 10 or 11 Pro and higher, includes various HP security features and is available on HP Pro, Elite, RPOS and Workstation products. See product details for included security features. 
  2. HP Sure Access Enterprise requires Windows 10 Pro or Enterprise. HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service or the HP Limited Warranty provided with your HP Product. For full system requirements, please visit www.hpdaas.com/requirements. 
  3. HP Wolf Protect and Trace is available on select HP 600, 800, 1000, Windows based Elite Dragonfly Laptops, select 800 desktops, and Z1 G8 Workstations and will function when the device is powered on and connected to the Internet. HP Wolf Protect & Trace requires HP TechPulse to be installed by customer manually via a one-click download at hp.com/premium-plus or by providing consent at the time of your hardware’s first boot, which enables HP to install HP TechPulse to collect information related to the Device. HP TechPulse is a telemetry and analytics platform that provides critical data around devices and applications and is not sold as a standalone service. HP TechPulse follows stringent GDPR privacy regulations and is ISO27001, ISO27701, ISO27017 and SOC2 Type2 certified for Information Security. Internet access with connection to TechPulse portal is required. For full system requirements, please visit http://www.hpdaas.com/requirements

Product images are for illustration purposes only, product availability and colors may vary by country.