DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY - HP WOLF ENTERPRISE SECURITY YOUR ENTERPRISE COULD BE JUST ONE CLICK AWAY FROM A CYBERSECURITY BREACH

Page created by Samantha Wright
 
CONTINUE READING
DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY - HP WOLF ENTERPRISE SECURITY YOUR ENTERPRISE COULD BE JUST ONE CLICK AWAY FROM A CYBERSECURITY BREACH
POWERED BY

HP WOLF ENTERPRISE SECURITY

DISRUPTING THE CYCLE OF
PERPETUAL VULNERABILITY
YOUR ENTERPRISE COULD BE JUST ONE CLICK AWAY
FROM A CYBERSECURITY BREACH
DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY - HP WOLF ENTERPRISE SECURITY YOUR ENTERPRISE COULD BE JUST ONE CLICK AWAY FROM A CYBERSECURITY BREACH
HP WOLF SECURITY

THE BIGGEST ADVANTAGE THE
ADVERSARY HAS IS THE BEHAVIOR OF
YOUR OWN USERS.
More than 70% of enterprise breaches are triggered by
users working with a PC.1 Of those breaches, more than
99% are executed through email, web, chat, or USB.2
And 99% of those require user engagement, meaning
the user clicks or is phished by bad actors.3

But with HP Sure Click Enterprise,4 email, web, chat, and
USB breaches are easily preventable. It provides a virtual
safety net for PC users, even when unknown threats slip
past other defenses. Hardware-enforced virtualization
isolates high-risk content to protect user PCs, data,
and credentials, rendering malware harmless, while IT
gets actionable threat intelligence to help strengthen
organizational security posture.
                                                             threat vectors and the downstream consequences,
Current HP capabilities address six threat vectors           enterprises employ an average of 60 controls from the
for the enterprise:                                          cloud down to the endpoint.

• Browsing                                                   Even with this many controls used to prevent
• Microsoft Office products                                  endpoint—and ultimately enterprise—infection, the
• PDFs                                                       enterprise is still just one click away from a breach. The
• Email                                                      technology is about 90%–95% effective, and that’s why
• Collaboration tools                                        breaches still occur. To make up the 5%–10%, Gartner
• Applications                                               suggests security awareness training, which is fine
                                                             for general corporate hygiene, but no match against
The payload related to these attacks can result in           professional threat actors.
ransomware, fileless malware, credential theft, infected
executable files, and more.

In an attempt to mitigate these vectors, enterprises have
implemented cloud, network, and endpoint controls,
including cloud CASB and cloud AV along with network
AV, sandboxing, and security analytics. On the endpoint
front, enterprises have implemented endpoint antivirus
programs, application whitelisting, and endpoint
detection and response (EDR). To protect against those

DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY                                                                           2
DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY - HP WOLF ENTERPRISE SECURITY YOUR ENTERPRISE COULD BE JUST ONE CLICK AWAY FROM A CYBERSECURITY BREACH
HP WOLF SECURITY

The reason the enterprise is just one click away from breach is the relationship between the end user and the
malicious content. In science, specifically the concept of causality, one event (a cause) contributes to the production
of another event (an effect). In cybersecurity—and specifically around Sure Click Enterprise—the cause is the user/
human error, and the effect is the consequences following an errant click.

By removing the cause, meaning the potential for human error, from the environment, ALL effects are eliminated.They
are eliminated because of their dependency upon human behavior extending the attack sequence into the enterprise.

Sure Click Enterprise is what removes the cause from the equation. Sure Click Enterprise places each user task
(e.g., opening an email attachment) in an isolated micro virtual machine (micro VM). This prevents malware from
escaping the task it arrived in, so it can’t infect the user’s computer, or anything else on the network. And when the
process is completed, the micro VM is destroyed, along with the malware. Best of all, user productivity is unaffected,
as users don’t have to do anything differently to gain the threat containment benefit of Sure Click Enterprise.

                                                 YOUR ENDPOINT

                         HP Sure Click Enterprise application isolation renders any malware or lurking malicious actors harmless
                         to your users’ PCs and your network.

         With the cause removed, there’s: Nothing to steal > Nowhere to go > No way to persist.
         With the potential for human error removed, the attacker’s enabler is removed. It’s as if

         70% OF THE ATTACKABLE
         SURFACE SIMPLY DISAPPEARS.

DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY                                                                                    3
DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY - HP WOLF ENTERPRISE SECURITY YOUR ENTERPRISE COULD BE JUST ONE CLICK AWAY FROM A CYBERSECURITY BREACH
HP WOLF SECURITY

PUT AN END TO THE CYBERATTACK CYCLE
WITH HP WOLF ENTERPRISE SECURITY

                                                                           HP applies zero-trust principles to endpoint security
                                                                           to help customers stay ahead of modern threats with
                                                                           defense-grade, hardware-enforced isolation and
                                                                           containment technology.

                                                                           As part of HP Wolf Enterprise Security services, HP
                                                                           Sure Click Enterprise keeps risky clicks contained using
                                                                           hardware-enforced micro VMs and advanced hypervisor
                                                                           technology to isolate email, applications, and browsers—
                                                                           safeguarding a user’s PC, identity, and network.

                                                                           With simple deployment and advanced, defense-
                                                                           grade threat intelligence—no additional on-premises
                                                                           infrastructure or software purchase required—HP Sure
                                                                           Click Enterprise is ideal for businesses and government
                                                                           entities with more mature security operations.

1
    https://www.rapid7.com/resources/rapid7-efficient-incident-detection-investigation-saves-money/
2
    HP Threat Intelligence data
3
    https://www.proofpoint.com/us/resources/threat-reports/human-factor
4
 HP Sure Click Enterprise is sold separately and requires Windows 8 or 10 and Microsoft Internet Explorer, Google Chrome, Chromium or Firefox are
supported. Supported attachments include Microsoft Office (Word, Excel, PowerPoint) and PDF files, when Microsoft Office or Adobe Acrobat are installed.

© Copyright 2021 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed
as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

c07599947, June 2021

DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY                                                                                                      4
You can also read