• Latest
  • Trending
HP

HP Launches ‘Sure Access Enterprise’’ to Protect Users’ access to Data

October 23, 2022
Edtech startup The Invigilator raises $11 million to scale its AI platform

Edtech startup The Invigilator raises $11 million to scale its AI platform

September 6, 2025
iXAfrica receives RMB financing to fast-track 20 MW expansion in Nairobi

iXAfrica receives RMB financing to fast-track 20 MW expansion in Nairobi

September 6, 2025
OpenAI challenges LinkedIn with new AI-powered hiring platform

OpenAI challenges LinkedIn with new AI-powered hiring platform

September 6, 2025
Tanzanian fintech NALA takes its services to Kenya

Tanzanian fintech NALA takes its services to Kenya

September 6, 2025
Call of Duty movie: Paramount, Activision strike deal for live-action adaptation

Call of Duty movie: Paramount, Activision strike deal for live-action adaptation

September 5, 2025
Meta Brings Back Facebook Poke with Emojis and Streaks

Meta Brings Back Facebook Poke with Emojis and Streaks

September 5, 2025
Know why they’re calling: Truecaller launches AI-powered insights

Know why they’re calling: Truecaller launches AI-powered insights

September 5, 2025
Visa harnesses local partnerships to launch Visa Pay in DR Congo

Visa harnesses local partnerships to launch Visa Pay in DR Congo

September 5, 2025
Betika denies recent reports of security breach

Betika denies recent reports of security breach

September 5, 2025
10 things you can actually buy with crypto in Africa

10 things you can actually buy with crypto in Africa

September 5, 2025
Your one-stop tech hub! Get the latest updates on AI, cybersecurity, fintech, and emerging technologies.
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
Techpression
No Result
View All Result
Home Business

HP Launches ‘Sure Access Enterprise’’ to Protect Users’ access to Data

Staff Writer by Staff Writer
October 23, 2022
146 4
0
HP
465
SHARES
Share on FacebookShare on TwitterWhatsAppTelegram

HP Inc., a multinational information technology company, has announced enhancements to its HP Wolf Security endpoint protection portfolio through the launch of Sure Access Enterprise (SAE), which protects users with the right to access sensitive data, systems, and applications.  

SAE safeguards against attackers from hijacking these privileged sessions; regardless of whether the users’ endpoint device is compromised, access to high-value data and systems remains safe. This prevents modest endpoint compromises from escalating into significant security problems. The program utilizes HP’s unique task isolation technology to operate each privileged access session within its own hardware-enforced virtual machine (VM). The program is available for both HP and non-HP devices.

In addition, the application safeguards the privacy and authenticity of the data by separating it from any malicious software running on the Operating endpoint system. Users can safely perform privileged, non-privileged, and personal activities from a single computer. This improves the user experience, lowers IT costs and increases security.

Ian Pratt, Global Head of Security for Personal Systems at HP Inc., said, “Securing access to the device of a privileged user is a vital stage in the attack chain.” An attacker can scrape credentials, elevate privileges, move laterally, and exfiltrate sensitive data from this point. “Sure Access Enterprise is a unique solution that prevents escalation and thwarts attackers.”

RelatedPosts

Samsung launches Vision AI TV

NCA seeks collaboration with BoG to regulate mobile money operations in Ghana

OpenAI lands $200 million Pentagon deal to develop AI tools, systems for national security 

Read also: Africa Data Centre Joins Force With IXPN Nigeria

Significant importance of SAE to organizations

In organizations, several users may regularly need access to privileged information, systems, and applications,  ranging from IT administrators and IoT/OT support employees to customer service representatives and accounting professionals. There is a high degree of vulnerability in allowing these users to carry out privileged and non-privileged tasks on the same PC.

If the endpoint is hacked, attackers may be able to hijack privileged sessions, acquire sensitive data and credentials, or inject malicious code and instructions (for instance, through injected keystrokes, clipboard capture, or memory scraping). This can still occur even if a Privileged Access Management (PAM) system is used to manage access to privileged systems.

The standard protocol has always been to provide privileged’ users with unique Privileged Access Workstations (PAW) with which they can perform only specified activities. However, this causes difficulties for end users and raises IT costs due to the necessity to purchase and manage two different systems.

The program can also secure critical assets

SAE creates protected VMs leveraging sophisticated hardware-enforced virtualization that is segregated from the desktop operating system and thus cannot be accessed, manipulated, or controlled by it. Hence, without the operational expense and complexity of issuing a separate PAW, the confidentiality and integrity of the application and data within the protected VM can be secured.

Pratt elaborates, “Sure Access Enterprise breaks the attack chain by isolating tasks in protected VMs, which are transparent to the end user.” “As well as protecting System Administrators accessing high-value servers, SAE can be used to protect other sensitive assets – for example, protecting credit card details accessed by customer support at a retailer, patient data access at a healthcare provider, or connections to an Industrial Control System at a manufacturer.”

Sure Access Enterprise is now available. Highlighted below are its features:

  • Strong Integrations with Privileged Access Management (PAM) solutions (e.g., CyberArk, BeyondTrust), IPSec remote access tunnels and Multifactor Authentication (MFA).
  • Centralized Management enables separation of duties and flexible policy options – such as locking connections to specific PCs or users or requiring HP Sure View activation for privacy.
  • Hardware root of trust, supported by the latest Intel® technologies, to prevent malware from bypassing security controls
  • Encrypted, tamper-resistant session logging to track access without recording sensitive data or credentials, easing compliance.

Africa Data Centre Joins Force With IXPN Nigeria

About HP Wolf Security

HP Wolf Protection is new endpoint security from the makers of the world’s most secure PCs and printers. HP’s portfolio of hardware-enforced security and endpoint-focused security services is intended to assist enterprises in protecting PCs, printers, and people from cyber predators. HP Wolf Security offers full endpoint protection and resilience, beginning with hardware and extending to software and services.

Tags: HPSecurity
Staff Writer

Staff Writer

No Result
View All Result

Quick Links

  • Tech News
  • Cryptocurrency
  • Fintech
  • Startups
  • Business

Follow Us:

  • facebook
  • instagram
  • Twitter(X)
  • Linkedin
  • YouTube
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Techpression.com -Techpression Media Limited

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

No Result
View All Result
  • Home
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Reviews
    • How To
    • General News
  • Cryptocurrency
  • Business
  • Fintech
  • Startups
  • Featured
  • Ai
  • Tech TV

© 2025 Techpression.com -Techpression Media Limited

techpression.com
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.