HP Wolf Security products.
Hardware and software work together to make you safer and more productive.
HP Wolf Security1 takes a full-stack approach to securing the weakest links in your security architecture—your endpoints and users. Our advanced threat containment strategy combines unique, CPU-enforced isolation technology with security features embedded into motherboard hardware to form a fortress of protection most threats can’t penetrate.
Threat containment – An advanced approach to endpoint protection.
Threat Containment technology uses isolation based on micro-virtual machines to protect users and defeat phishing and other attack vectors NGAV and EDR solutions may let through. Malware can’t make its way around isolation measures because they are enforced by CPU hardware.
- Mitigates attacks from e-mail attachments, web links, and USB drives
- Supported by AMD and Intel CPUs
- More than 18 billion clicks without a reported compromise
Threat containment – An advanced approach to endpoint protection.
Threat Containment technology uses isolation based on micro-virtual machines to protect users and defeat phishing and other attack vectors NGAV and EDR solutions may let through. Malware can’t make its way around isolation measures because they are enforced by CPU hardware.
- Mitigates attacks from e-mail attachments, web links, and USB drives
- Supported by AMD and Intel CPUs
- More than 18 billion clicks without a reported compromise
- Prevents phishing and ransomware from corrupting PCs
- Patch management compensating control
- CPU acceleration maintains app performance
- Fewer high-priority tickets and false positives
- Less endpoint remediation
- High fidelity visibility and threat intelligence
- Work without worry; open email attachments with confidence
- Reduce “spot the phishing” exercises
- No proxy delays or changes to application behaviour

Micro-virtual machines.
- Per-task isolation of potentially risky activity
- Hardware-enforced attack surface reduction
- Secure web browser

Isolated introspection.
- “Safe Space” malware execution sandbox
- Realistic environment provides superior forensics of malware behaviour
- Identifies previously unseen attack techniques and combinations

Analytics and reporting.
- Centralised cloud or on-premises policy and event management
- Detailed per-event threat intel reports, including MITRE ATT&CK mapping
- Integrations via STIX/TAXII
Endpoint Isolation - A superior approach to endpoint protection and SOC efficiency
* Required fields
We take the protection of your data very seriously. For details, please read our Privacy Policy.
By submitting this form you agree that Bechtle B.V may process your personal details in line with our Privacy Policy. You also agree that we may contact you by phone about our products and services.