Custom and standards-based motherboard silicon provides resilient, tamper-resistant platform for security services across the stack.
The World’s Most Secure Printers3
Fundamental controls protect the firmware layer from the rise in targeted attacks below the OS: code integrity, configuration security, and vulnerability management.
Potentially risky tasks are run in micro-virtual machines, preventing attacks from infecting machines without impacting user productivity.
Sensitive privileged-user applications are isolated from threats, even if the OS is compromised. Access to sensitive data and systems can be performed using general-purpose PCs, with decreased risk of attack propagation across security domains.
Threat Containment
Patch Management
Privileged Access
Lost or Stolen PCs
Unlike conventional antivirus solutions, HP Wolf Security isolates and contains threats such as phishing and ransomware before they can infect endpoints. It’s a unique approach that takes advantage of hardware enforcement available on commercial Intel® and AMD CPUs to create a barrier hackers can’t work around.
Superb threat analytics and browser isolation leave workers free to work without fear of triggering an attack, while SOC teams enjoy better visibility and fewer tickets. HP and non-HP PCs supported.
HP Sure Click EnterprisePatching is a primary security control, but keeping a multitude of endpoints up-to-date across an organization presents a serious IT challenge that can lead to gaps and create security vulnerabilities. Hardware-enforced threat isolation from HP Wolf Security provides protection for PCs between patching cycles, reducing risk and easing IT operations by eliminating frequent or emergency patching. HP and non-HP PCs supported.
Patch ManagementPrivileged activity requires advanced security controls. HP Wolf Security isolates remote access applications such as RDP from malware compromise, vastly reducing the risk of keyboard, display, or memory data interception. Organizations are free to consolidate multiple PAWs to a single PC, with the peace of mind that comes with CPU hardware enforcement. HP and non-HP PCs supported.
HP Sure AccessA rapid rise in remote and hybrid work has made the prospect of lost and missing PCs more common and the security and operational impacts of it more profound. HP Protect & Trace2 allows administrators to locate, temporarily lock, and if necessary, wipe PCs remotely. Cloud-based, multi-person policy authorization keeps IT overhead low and reduces the risk of staff-related errors.
HP Protect & TraceModern Management
Incident Recovery
Lifecycle Management
User Productivity
Accelerate the transition to cloud-based Modern Management across the stack: Factory or partner services for Autopilot pre-enrolment; autonomous BIOS recovery, and customizable Windows recovery from secure local storage or the cloud. Eliminate on-premise management infrastructure and the need for physical access to endpoint PCs.
HP Sure AdminWhether you’re dealing with a single corrupted PC or managing an entire fleet of compromised machines, the primary goal of Incident Recovery (IR) or Disaster Recovery (DR) is to return endpoints to a trusted, usable state. HP PCs can be re-imaged to a fully-customized configuration or “bare-bones” safe state in a matter of minutes, without an Internet connection or physical access. IR and DR efforts are aided by secured, resilient firmware that work together to help reduce operational overhead and equipment downtime.
HP Sure RecoverEfficient maintenance of fleet security throughout the life of each machine is essential to lowering operational costs and reducing risk. HP PCs streamline security across the endpoint lifecycle, from procurement, preparation, and deployment to day-to-day management and retirement.
HP Wolf Security offers factory pre-provisioning, Modern Management, simplified BIOS security, and Data Erase. All capabilities are supported by HP’s extensive partner community, or can be self-managed.
HP Sure AdminHP Wolf Security protects users from threats and keeps them up and running in a way that is nearly invisible to them. Users remain focused on work while IT enjoys greater availability, better operational efficiency, and faster recovery. It’s a risk management strategy that boosts productivity rather than hinders it.
HP Sure StartBIOS/Firmware Integrity
Physical Compromise
Supply Chain Compromise
Compliance & Audit
A secure computing environment depends on a secure foundation. HP PCs deliver true full-stack security at all levels of the platform, including the motherboard hardware, peripheral interfaces, BIOS and third-party firmware and configuration, and the operating system. A full-stack solution maintains PC platform integrity even in the face of today’s most sophisticated and evolving “below the OS” attacks.
HP Sure StartRemote work and travel expose fleet PCs to attacks of physical manipulation. In less than a minute, through physical access, hackers can target a machine’s peripheral ports or even attempt to remove its cover to cause damage or access sensitive data. HP Wolf Pro Security Edition6 PCs detect and prevent such attacks, providing an important additional level of protection for your laptops, data, and users.
HP Tamper LockSophisticated threat actors subvert fleet supply chains to compromise PCs prior to delivery. HP premium business PCs come equipped with HP's Endpoint Security Controller on the motherboard, providing a hardware-based root of trust. Firmware, operating systems and applications are all executed securely on the platform with confidence.
HP Sure AdminAs the delivery point for sensitive data, end-user PCs are in-scope for compliance and internal audit. In addition, control objectives go beyond the OS level and apply across the stack. HP's full-stack approach to platform security supports implementing control activities for hardware, code, and configuration integrity below the OS. Centralized policy and SSO support make control validation and auditing simpler to perform.
PC Platform Security01
HP Security Manager is our most comprehensive printing security solution. It does the hard work of ensuring fleet-wide compliance with your security policy, so you don’t have to.
Learn02
Print sensitive documents to shared printers without security worries and reduce waste from accidental and forgotten print jobs with HP Secure Print.6
Learn03
HP Advance is a highly scalable print management software that enhances security through user authentication, secured mobile printing and streamlined digital processes.7
Learn04
Arm your IT team with another layer of defense by getting expert security help through HP Print Security Services, leveraging the Cloud to help secure print infrastructure with HP Managed Print Cloud Services, or closing your security gaps with HP Secure Managed Print Services.
01
With HP Security Manager, a single IT person can manage an entire fleet of printers, including setting security policies, helping to ensure compliance, and protecting workflows.
Learn02
Print sensitive documents to shared printers and let authorized users release them with a QR code, keeping print jobs private and reducing waste.8
Learn03
HP Security Assessment Tools quickly check your printer fleet, point out vulnerabilities like out-of-date firmware or network settings, and show you how to close the gaps.
LearnHP Wolf Security brings a host of advanced technologies to your endpoint cyber-defenses, supporting HP and non-HP (OEM) PCs, and HP printers.
Quarterly Threat Report
This report reviews notable threats, malware trends and techniques identified by HP Wolf Security’s customer telemetry in calendar Q3 2022. Highlights include...
Read the reportThe workplace has evolved, ushering in the age of hybrid working. Digital and workplace transformation have both been accelerated, and work has forever changed...
Read the reportThe global pandemic forced organizations to pivot rapidly from an office-based workforce model to one in which dynamic, hybrid working is the norm. This new way...
Read the reportHP Wolf Security1 takes a full-stack approach to securing the weakest links in your security
architecture—your endpoints and users. Our advanced threat containment strategy combines
unique, CPU-enforced isolation technology with security features embedded into
motherboard hardware to form a fortress of protection most threats can’t penetrate.
Threat Containment technology uses isolation based on micro-virtual machines to protect users and defeat phishing and other attack vectors NGAV and EDR solutions may let through. Malware can’t make its way around isolation measures because they are enforced by CPU hardware.
Prevents phishing and ransomware from corrupting PCs or moving laterally
Patch management compensating control
CPU acceleration maintains app performance
Fewer high-priority tickets and false positives
Less endpoint remediation
High fidelity visibility and threat intelligence
Work without worry; open email attachments with confidence
Reduce “spot the phishing” exercises
No proxy delays or changes to application behavior
Maximum flexibility to satisfy the most demanding requirements
Simplified policy management for smaller organizations or less complex systems
HP Wolf Security Platform |
HP Wolf Pro Security Enhanced protection that’s easy to |
HP Sure Click Enterprise Robust, custom security for complex |
Hardware-Enforced Threat Containment |
Advanced |
Advanced |
Browser Isolation |
Standard |
Advanced |
Credential Protection |
Standard |
Advanced |
Threat Containment Policy Configuration |
Basic |
Advanced |
Wolf Controller Management |
Cloud |
Cloud or On-Premises |
Next-Gen Anti-Virus |
Optional |
Customer Choice |
Read the Datasheet Read the Solution Brief |
Read the Datasheet Read the Solution Brief |
Cyber criminals target privileged users with spear-phishing and other behavior-based attacks to try and access sensitive data. HP Sure Access Enterprise2 uses endpoint isolation technology to defeat such attacks, protecting your privileged data and securing remote access sessions—even if a PC is compromised–with CPU-enforced micro-virtualization. Your data stays safe and your systems remain available.
Isolates sensitive data from compromises with hardware-enforced micro-virtualization
Drastically reduces the attack surface area for privileged access
Safeguards against keylogging, screen capture, memory tampering, and man-in-the-middle attacks
Enables a single workstation for privileged, non-privileged, and personal activity
Allows IT teams to work without concern that they will facilitate a spear-phishing attack
Maintains consistent user experience across applications
Lowers costs and IT overhead by consolidating privileged workstations per user
Eliminates additional PAW endpoint controls
Complements and integrates with popular PAM solutions
HP Wolf Protect and Trace3 dramatically reduces the risk of data falling into the wrong hands when a PC is lost or stolen. A missing laptop can be located, temporarily locked, or erased remotely, relieving IT and security teams of a major source of time and concern. With value pricing and cloud-based management, HP Wolf Protect and Trace is ideal for small to mid-sized organizations with limited IT resources.
Lock or wipe missing PCs remotely to prevent data theft
Create more time for effective incident response
Reduce or eliminate breach notification requirements with a compensating control
Find missing laptops quickly
Alleviate frustration of lengthy IT support tickets or PC replacement processes
Support remote work and business travel with elite security
Eliminate time-consuming tickets related to missing PCs or device replacement
Enjoy simple, cloud-based management for internal or outsourced/MSSP operations
Save even more with the Active Care bundle option
Let’s get started finding the right HP products and solutions for your business needs.
The information contained herein is subject to change without notice.
1. HP Wolf Security for Business requires Windows 10 or 11 Pro and higher, includes various HP security features and is available on HP Pro, Elite, RPOS and Workstation products. See product details for included security features.
2. Based on HP’s unique and comprehensive security capabilities at no additional cost among vendors on HP Elite PCs with Windows and 8th Gen and higher Intel® processors or AMD Ryzen™ 4000 processors and higher; HP ProDesk 600 G6 with Intel® 10th Gen and higher processors; and HP ProBook 600 with AMD Ryzen™ 4000 or Intel® 11th Gen processors and higher.
3. HP’s most advanced embedded security features are available on HP Managed and Enterprise devices with HP FutureSmart firmware 4.5 or above. Claim based on HP review of 2022 published features of competitive in-class printers. Only HP offers a combination of security features to automatically detect, stop, and recover from attacks with a self-healing reboot, in alignment with NIST SP 800-193 guidelines for device cyber resiliency. For a list of compatible products, visit hp.com/go/PrintersThatProtect . For more information, visit hp.com/go/PrinterSecurityClaims.
4. HP Wolf Security for Business requires Windows 10 or 11 Pro and higher, includes various HP security features and is available on HP Pro, Elite, RPOS and Workstation products. See product details for included security features.
5. HP Wolf Protect and Trace is available on select HP 600, 800, 1000, Windows based Elite Dragonfly Laptops, select 800 desktops, and Z1 G8 Workstations and will function when the device is powered on and connected to the Internet. HP Wolf Protect & Trace requires HP TechPulse to be installed by customer manually via a one-click download at hp.com/active-care or by providing consent at the time of your hardware’s first boot, which enables HP to install HP TechPulse to collect information related to the Device. HP TechPulse is a telemetry and analytics platform that provides critical data around devices and applications and is not sold as a standalone service. HP TechPulse follows stringent GDPR privacy regulations and is ISO27001, ISO27701, ISO27017 and SOC2 Type2 certified for Information Security. Internet access with connection to TechPulse portal is required. For full system requirements, please visit http://www.hpdaas.com/requirements
6. HP Secure Print works with most network-connected printers and MFPs. On-device authentication requires HP FutureSmart firmware 4.8 or newer. Supported card readers include X3D03A (HP USB Universal Card Reader) and Y7C05A (HP HIP2 Keystroke Reader). Internet connection required for some functionality. For more information, see hp.com/go/secureprint.
7. HP Advance works with most network-connected printers and MFPs. On-device authentication requires HP FutureSmart firmware 4.8 or newer. Supported card readers include X3D03A (HP USB Universal Card Reader) and Y7C05A (HP HIP2 Keystroke Reader). Internet connection required for some functionality. For more information, see hp.com/go/advance.
8. HP Wolf Pro Security Edition (including HP Sure Click Pro and HP Sure Sense Pro) is available preloaded on select SKUs and, depending on the HP product purchased, includes a paid 1-year or 3-year license. The HP Wolf Pro Security Edition software is licensed under the license terms of the HP Wolf Security Software - End-User license Agreement (EULA) that can be found at:https://support.hp.com/us-en/document/ish_3875769-3873014-16 as that EULA is modified by the following: “7. Term. Unless otherwise terminated earlier pursuant to the terms contained in this EULA, the license for the HP Wolf Pro Security Edition (HP Sure Sense Pro and HP Sure Click Pro) is effective upon activation and will continue for either a twelve (12) month or thirty-six (36) month license term (“Initial Term”). At the end of the Initial Term you may either (a) purchase a renewal license for the HP Wolf Pro Security Edition from HP.com, HP Sales or an HP Channel Partner, or (b) continue using the standard versions of HP Sure Click and HP Sure Sense at no additional cost with no future software updates or HP Support.
© Copyright HP Development Company, L.P.