Intel

Intel logo

HP Proactive Security

Defend against cyberattacks without changing user behavior or increasing IT's workload.  Protect data, device and identity security for SMB with a managed endpoint protection security service right-sized for medium businesses.1

Protection you can trust

Rest assured your data, devices and credentials are secure with reinforcing layers of proactive protection that use government-grade isolation and advanced deep learning technologies instead of traditional anti-virus tools that are ineffective in protecting endpoints against unknown threats.

1
A protection-first approach
A multi-layered defense with award-winning deep learning anti-malware and isolation technologies.
2
Government-grade technology
Secure endpoints with trusted technology that’s been adapted to address the needs of medium-sized businesses.
3

A worry-free, managed service

Certified HP Security Experts monitor and manage your endpoint fleet protection, freeing your IT to focus on more strategic projects.

Simplified security management

Benefit from an advanced security service, including actionable insights, without the complexity or need for in-house expertise. Keep your IT focused on more strategic business initiatives instead of responding to security breaches.

Comprehensive and worry-free solution management

Reduce the burden on IT and free resources to focus on strategic projects instead of monitoring security threats. With HP Proactive Security, a managed cloud service, certified security experts provide ongoing management of the solution.

Expertly managed by certified security professionals

Help protect yourself against future attacks with device protection monitoring, and forensic threat intelligence and analysis by the security experts on our managed service team.

Timely and actionable analytics and insights

Monitor the security of your devices from the HP TechPulse3 one-stop dashboard and receive reports and alerts about unprotected devices and insights on attempted threats.

Keep employees productive

Empower employee productivity with transparent protection for the applications they prefer without restrictions, or fear of compromising their data, credentials or network.

  • Invisible layers of protection

    Help protect employees from malware and phishing attacks without creating barriers to their daily productivity with transparent protection that works behind the scenes.

  • Freedom to work uninterrupted

    Give employees the freedom to work unrestricted with full functionality to securely read, edit, save and print Microsoft Office and PDF documents.

What's included in the HP Proactive Security Service:

Advanced deep learning anti-malware protection4

  • Detection of both known and previously unseen threats
  • Static malware files and file-less threats​ protection
  • Cloud-based reputation analysis of files
  • Detects malware evasion techniques
  • No signature updates required

Real-time threat isolation protection5

  • Email attachment isolation
  • Chat link and file sharing protection
  • Protection from documents sent by phishing emails
  • File download protection
  • Corporate website whitelisting support for IT

Credential theft protection5

  • Prevents credential theft by alerting and blocking users from sharing login details on websites
  • Allows users to login as usual to known safe sites
  • Blocks users from entering credentials on known malicious sites
  • Warns users against entering credentials on unknown and low-reputation sites

Security analytics and reporting through HP TechPulse3

  • Endpoint device protection status and gap by length of time
  • Most impacted devices and users by prevented threats
  • Threats by type, source and over time

HP managed service

  • Analysis of forensic threat intelligence by certified HP Security Experts
  • Detailed kill chain analysis of malware attacks mapped to the MITRE ATT&CKTM framework6
  • Monitoring of isolation protection on endpoints
  • APIs for SIEM integration

Resources

Solution Brief

Learn more about HP Proactive Security with this 2-page overview of the service.

FAQ

Get answers to the most frequent questions about our Proactive Security service.

Technical Whitepaper

Learn more about how HP’s award-winning isolation and deep learning technologies protect your endpoint devices. 

HP Proactive Security Enhanced Onboarding

Take advantage of our managed service to integrate HP Proactive Security into your overall security stack. Enhanced Onboarding delivers design and deployment services along with policy setting and custom configuration.

Disclaimer

  1. HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service or the HP Limited Warranty provided with your HP Product.
  2. Based on HP’s internal analysis of isolation backed, deep learning endpoint security services including SaaS and managed services. Most advanced based on application isolation and deep learning endpoint protection on Windows 10 PCs as of March 2020.
  3. HP TechPulse is a telemetry and analytics platform that provides critical data around devices and applications. The reporting in HP TechPulse focuses on identifying threats and their source. HP TechPulse is GDPR and ISO 27001 compliant.
  4. HP Sure Sense Advanced is included with HP Proactive Security. For system requirements, please visit www.hpdaas.com/requirements.
  5. HP Sure Click Pro is included with HP Proactive Security requires Windows 10 Pro or Enterprise and Microsoft Internet Explorer, Google Chrome, Chromium, Mozilla Firefox and new Edge are supported. Supported attachments include Microsoft Office (Word, Excel, PowerPoint) and PDF files, when Microsoft Office or Adobe Acrobat are installed.
  6. MITRE does not claim ATT&CK enumerates all possibilities for the types of actions and behaviors documented as part of its adversary model and framework of techniques. Using the information contained within ATT&CK to address or cover full categories of techniques will not guarantee full defensive coverage as there may be undisclosed techniques or variations on existing techniques not documented by ATT&CK.

    Intel, the Intel Logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

    © 2021 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation