DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY - HP WOLF ENTERPRISE SECURITY YOUR ENTERPRISE COULD BE JUST ONE CLICK AWAY FROM A CYBERSECURITY BREACH
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
POWERED BY HP WOLF ENTERPRISE SECURITY DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY YOUR ENTERPRISE COULD BE JUST ONE CLICK AWAY FROM A CYBERSECURITY BREACH
HP WOLF SECURITY THE BIGGEST ADVANTAGE THE ADVERSARY HAS IS THE BEHAVIOR OF YOUR OWN USERS. More than 70% of enterprise breaches are triggered by users working with a PC.1 Of those breaches, more than 99% are executed through email, web, chat, or USB.2 And 99% of those require user engagement, meaning the user clicks or is phished by bad actors.3 But with HP Sure Click Enterprise,4 email, web, chat, and USB breaches are easily preventable. It provides a virtual safety net for PC users, even when unknown threats slip past other defenses. Hardware-enforced virtualization isolates high-risk content to protect user PCs, data, and credentials, rendering malware harmless, while IT gets actionable threat intelligence to help strengthen organizational security posture. threat vectors and the downstream consequences, Current HP capabilities address six threat vectors enterprises employ an average of 60 controls from the for the enterprise: cloud down to the endpoint. • Browsing Even with this many controls used to prevent • Microsoft Office products endpoint—and ultimately enterprise—infection, the • PDFs enterprise is still just one click away from a breach. The • Email technology is about 90%–95% effective, and that’s why • Collaboration tools breaches still occur. To make up the 5%–10%, Gartner • Applications suggests security awareness training, which is fine for general corporate hygiene, but no match against The payload related to these attacks can result in professional threat actors. ransomware, fileless malware, credential theft, infected executable files, and more. In an attempt to mitigate these vectors, enterprises have implemented cloud, network, and endpoint controls, including cloud CASB and cloud AV along with network AV, sandboxing, and security analytics. On the endpoint front, enterprises have implemented endpoint antivirus programs, application whitelisting, and endpoint detection and response (EDR). To protect against those DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY 2
HP WOLF SECURITY The reason the enterprise is just one click away from breach is the relationship between the end user and the malicious content. In science, specifically the concept of causality, one event (a cause) contributes to the production of another event (an effect). In cybersecurity—and specifically around Sure Click Enterprise—the cause is the user/ human error, and the effect is the consequences following an errant click. By removing the cause, meaning the potential for human error, from the environment, ALL effects are eliminated.They are eliminated because of their dependency upon human behavior extending the attack sequence into the enterprise. Sure Click Enterprise is what removes the cause from the equation. Sure Click Enterprise places each user task (e.g., opening an email attachment) in an isolated micro virtual machine (micro VM). This prevents malware from escaping the task it arrived in, so it can’t infect the user’s computer, or anything else on the network. And when the process is completed, the micro VM is destroyed, along with the malware. Best of all, user productivity is unaffected, as users don’t have to do anything differently to gain the threat containment benefit of Sure Click Enterprise. YOUR ENDPOINT HP Sure Click Enterprise application isolation renders any malware or lurking malicious actors harmless to your users’ PCs and your network. With the cause removed, there’s: Nothing to steal > Nowhere to go > No way to persist. With the potential for human error removed, the attacker’s enabler is removed. It’s as if 70% OF THE ATTACKABLE SURFACE SIMPLY DISAPPEARS. DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY 3
HP WOLF SECURITY PUT AN END TO THE CYBERATTACK CYCLE WITH HP WOLF ENTERPRISE SECURITY HP applies zero-trust principles to endpoint security to help customers stay ahead of modern threats with defense-grade, hardware-enforced isolation and containment technology. As part of HP Wolf Enterprise Security services, HP Sure Click Enterprise keeps risky clicks contained using hardware-enforced micro VMs and advanced hypervisor technology to isolate email, applications, and browsers— safeguarding a user’s PC, identity, and network. With simple deployment and advanced, defense- grade threat intelligence—no additional on-premises infrastructure or software purchase required—HP Sure Click Enterprise is ideal for businesses and government entities with more mature security operations. 1 https://www.rapid7.com/resources/rapid7-efficient-incident-detection-investigation-saves-money/ 2 HP Threat Intelligence data 3 https://www.proofpoint.com/us/resources/threat-reports/human-factor 4 HP Sure Click Enterprise is sold separately and requires Windows 8 or 10 and Microsoft Internet Explorer, Google Chrome, Chromium or Firefox are supported. Supported attachments include Microsoft Office (Word, Excel, PowerPoint) and PDF files, when Microsoft Office or Adobe Acrobat are installed. © Copyright 2021 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. c07599947, June 2021 DISRUPTING THE CYCLE OF PERPETUAL VULNERABILITY 4
You can also read