Ensure the confidentiality and integrity of the data to which it is accessed, isolating them of any malware in the operating system of the Endpoint It is one of the needs that most companies claim.

Therefore, from HP, have announced improvements in its portfolio of protection of EndpointsHP Wolf Security, with the launch of Sure Access Enterprise, which protects users with access permits, sensitive or confidential data, systems and applications.

«Getting access to a user’s device with confidential data and systems is a crucial point in the attack chain. From here, an attacker can extract credentials, climb, move and filter confidential data, ”says Ian Pratt, Global Security Director for HP personal systems.

Safety at Endpoint

Companies have different types of users who need to access daily data, systems and applications with sensitive and confidential data. Allowing these users to perform confidential and non -confidential access tasks on the same PC leads to considerable risk.

The best practice has traditionally been to provide users with confidential information on privileged access work stations (PAW) that are used exclusively for confidential tasks. However, this is not practical for users and increases the general expenses of IT when buying and managing two systems.

Sure Access Enterprise

SAE uses advanced virtualization reinforced by hardware to create protected VMS that are isolated from the desktop operating system and, therefore, cannot be seen, influenced or controlled.

HP SOUTH SOUTH ACCESS ENTERPRISE for data protection and confidential information

In this way, the confidentiality and integrity of the application and the data within the protected VM can be guaranteed, without the operational cost and the complexity of issuing an independent PAW

“By isolating tasks in protected virtual machines, which are invisible to the end user, Sure Access Enterprise interrupts the chain of attacks,” adds Pratt.

Availability

Currently, Sure Access Enterprise is now available with the following capabilities:

  • Solid integrations With privileged access management solutions (PAM) (for example, Cyberark or Beyondtrust), IPSEC remote access tunnels and multifactor authentication (MFA).
  • Centralized management To allow the separation of flexible policies and options, such as blocking PC connections or specific users or demanding the activation of HP Sure View for privacy.
  • Hardware to guarantee trust, backed by the latest Intel® technologies to prevent malware eludes security controls.
  • Registration of encrypted sessions already proof of modifications To trace access, without registering confidential data or credentials, facilitating compliance with the regulations.