IT Security HP Wolf Security
Protect your employees from cyber threats without limiting their productivity
Danger is just a click away
%
of all security breaches are due to social attacks and human error.¹
Malware attacks are transmitted by email.²
%
of the malware is unknown at the time of the attack.
Industry-leading software for endpoint security
HP Wolf Security reduces the accessible attack surface and enables remote recovery from firmware attacks. From automatic firmware self-healing to memory breach detection and threat isolation protection, we strengthen your security front.
Your contact person will tell you more.
HP Wolf Pro Security Service
Protect your company with a multi-level service for end device security
Protect against cyberattacks without impacting employee productivity or increasing IT workloads with HP Wolf Pro Security Service, an endpoint security solution with industry-certified expertise.4
A new approach to IT security:
Hardware, software and services
Hardware: Maximum security for your PCs
Protected PCs and printers from HP with integrated endpoint security on several levels below, in and above the operating system. We also equip you with a secure basis for fail-safe operation.
Software: Industry leader in endpoint security
HP Wolf Security reduces the accessible attack surface and enables remote recovery from firmware attacks. From automatic firmware self-healing to memory breach detection and threat mitigation through isolation, we strengthen your front line of defense.
Services: Security for every company
You and your team get self-managed and fully managed services Contact to our HP cybersecurity experts and access to powerful analysis tools. We ensure that your IT team is strengthened, saving you valuable resources.
HP Wolf Enterprise Security Service
Zero Trust approach
Our Zero Trust approach to hardware, software and services reduces system vulnerabilities to make your business IT more resilient.
Would you like to learn more about HP Wolf Security Services?
1Verizon2020 Data Breach Investigations Report, May 19, 2020
2 HP Wolf Security Threat Research.
3HPWolf Security Threat Research.
4HPWolf Pro Security Service must be purchased separately. The complete system requirements can be found at http://www.hpdaas.com/requirements. HP Services are subject to the applicable terms and conditions provided or stated to Customer at the time of purchase. Customer may have additional rights under local laws. These claims are without prejudice to the HP terms and conditions relating to the service or the HP Limited Warranty of the HP product. For complete system requirements, please visit www.hpdaas.com/requirements.
5HPSure Sense is available on select HP PCs and is not available for Windows 10 Home.
6MITREdoes not claim that ATT&CK lists all possibilities for the types of actions and behaviors documented within its model and framework of techniques for hostile behaviors. Applying the information contained in ATT&CK to complete categories of techniques does not guarantee complete protection, as ATT&CK may not document previously unknown or variations of existing techniques.
7HPSure Click Pro isolation technology is included in HP Proactive Security and requires Windows 10 Pro or Enterprise. Microsoft Internet Explorer, Google Chrome, Chromium, Mozilla Firefox and the new Edge browser are supported. Supported attachments include Microsoft Office (Word, Excel, PowerPoint) and PDF files if Microsoft Office or Adobe Acrobat is installed.
8HPSure Click Enterprise requires Windows 8 or Windows 10 and supports Microsoft Internet Explorer, Google Chrome, Chromium and Firefox. Supported attachments include Microsoft Office (Word, Excel, PowerPoint) and PDF files if Microsoft Office or Adobe Acrobat is installed.






