• Latest
  • Trending
HP

HP Launches ‘Sure Access Enterprise’’ to Protect Users’ access to Data

October 23, 2022
African startups raised $141.7 million in September 2025

African startups raised $141.7 million in September 2025

October 17, 2025
Pre-seed funding round fuels Tunisian startup PAYDAY with $3 million

Pre-seed funding round fuels Tunisian startup PAYDAY with $3 million

October 17, 2025
YouTube updates its user interface across all devices

YouTube updates its user interface across all devices

October 17, 2025
Tech companies dominate Interbrand’s 2025 Best Global Brands

Tech companies dominate Interbrand’s 2025 Best Global Brands

October 17, 2025
Innoson, Nigerian automaker, unveils plan to establish CNG assembly plant in Bayelsa

Innoson, Nigerian automaker, unveils plan to establish CNG assembly plant in Bayelsa

October 16, 2025
Spotify testing ‘SongDNA’ to show everyone behind your songs

Spotify testing ‘SongDNA’ to show everyone behind your songs

October 16, 2025
$395mn submarine cable project, Medusa, begins deployment to link Europe to Africa

$395mn submarine cable project, Medusa, begins deployment to link Europe to Africa

October 16, 2025
Chari raises $12M, gets Morocco’s first VC-backed payment license

Chari raises $12M, gets Morocco’s first VC-backed payment license

October 16, 2025
NCBA unveils ConnectPlus to improve businesses in Kenya

NCBA unveils ConnectPlus to improve businesses in Kenya

October 16, 2025
Slack supercharges Slackbot with smarter AI capabilities

Slack supercharges Slackbot with smarter AI capabilities

October 16, 2025
Gemini AI now handles your Google Calendar meeting scheduling

Gemini AI now handles your Google Calendar meeting scheduling

October 16, 2025
Sun King, REA partner to boost access to clean energy

Sun King, REA partner to boost access to clean energy

October 16, 2025
Techpression
Advertisement
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
Saturday, October 18, 2025
No Result
View All Result
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
Techpression
No Result
View All Result
Home Business

HP Launches ‘Sure Access Enterprise’’ to Protect Users’ access to Data

Staff Writer by Staff Writer
October 23, 2022
in Business, Business Strategy, Computers, Data, Editors Pick, Entrepreneurship, Global Tech News, HP, Innovation, IoT, Science, Security, Tech News, Technology
146 4
0
HP
466
SHARES
Share on FacebookShare on TwitterWhatsAppTelegram

HP Inc., a multinational information technology company, has announced enhancements to its HP Wolf Security endpoint protection portfolio through the launch of Sure Access Enterprise (SAE), which protects users with the right to access sensitive data, systems, and applications.  

SAE safeguards against attackers from hijacking these privileged sessions; regardless of whether the users’ endpoint device is compromised, access to high-value data and systems remains safe. This prevents modest endpoint compromises from escalating into significant security problems. The program utilizes HP’s unique task isolation technology to operate each privileged access session within its own hardware-enforced virtual machine (VM). The program is available for both HP and non-HP devices.

In addition, the application safeguards the privacy and authenticity of the data by separating it from any malicious software running on the Operating endpoint system. Users can safely perform privileged, non-privileged, and personal activities from a single computer. This improves the user experience, lowers IT costs and increases security.

Ian Pratt, Global Head of Security for Personal Systems at HP Inc., said, “Securing access to the device of a privileged user is a vital stage in the attack chain.” An attacker can scrape credentials, elevate privileges, move laterally, and exfiltrate sensitive data from this point. “Sure Access Enterprise is a unique solution that prevents escalation and thwarts attackers.”

RelatedPosts

Tango Brook launches digital card for fuel management

Tango Brook launches digital card for fuel management

September 25, 2025
Google’s Gemini AI is coming to Chrome

Google’s Gemini AI is coming to Chrome

September 22, 2025

Samsung launches Vision AI TV

August 18, 2025

NCA seeks collaboration with BoG to regulate mobile money operations in Ghana

August 14, 2025
Load More
Read also: Africa Data Centre Joins Force With IXPN Nigeria

Significant importance of SAE to organizations

In organizations, several users may regularly need access to privileged information, systems, and applications,  ranging from IT administrators and IoT/OT support employees to customer service representatives and accounting professionals. There is a high degree of vulnerability in allowing these users to carry out privileged and non-privileged tasks on the same PC.

If the endpoint is hacked, attackers may be able to hijack privileged sessions, acquire sensitive data and credentials, or inject malicious code and instructions (for instance, through injected keystrokes, clipboard capture, or memory scraping). This can still occur even if a Privileged Access Management (PAM) system is used to manage access to privileged systems.

The standard protocol has always been to provide privileged’ users with unique Privileged Access Workstations (PAW) with which they can perform only specified activities. However, this causes difficulties for end users and raises IT costs due to the necessity to purchase and manage two different systems.

The program can also secure critical assets

SAE creates protected VMs leveraging sophisticated hardware-enforced virtualization that is segregated from the desktop operating system and thus cannot be accessed, manipulated, or controlled by it. Hence, without the operational expense and complexity of issuing a separate PAW, the confidentiality and integrity of the application and data within the protected VM can be secured.

Pratt elaborates, “Sure Access Enterprise breaks the attack chain by isolating tasks in protected VMs, which are transparent to the end user.” “As well as protecting System Administrators accessing high-value servers, SAE can be used to protect other sensitive assets – for example, protecting credit card details accessed by customer support at a retailer, patient data access at a healthcare provider, or connections to an Industrial Control System at a manufacturer.”

Sure Access Enterprise is now available. Highlighted below are its features:

  • Strong Integrations with Privileged Access Management (PAM) solutions (e.g., CyberArk, BeyondTrust), IPSec remote access tunnels and Multifactor Authentication (MFA).
  • Centralized Management enables separation of duties and flexible policy options – such as locking connections to specific PCs or users or requiring HP Sure View activation for privacy.
  • Hardware root of trust, supported by the latest Intel® technologies, to prevent malware from bypassing security controls
  • Encrypted, tamper-resistant session logging to track access without recording sensitive data or credentials, easing compliance.

Africa Data Centre Joins Force With IXPN Nigeria

About HP Wolf Security

HP Wolf Protection is new endpoint security from the makers of the world’s most secure PCs and printers. HP’s portfolio of hardware-enforced security and endpoint-focused security services is intended to assist enterprises in protecting PCs, printers, and people from cyber predators. HP Wolf Security offers full endpoint protection and resilience, beginning with hardware and extending to software and services.

Tags: HPSecurity
Staff Writer

Staff Writer

Quick Links

  • Tech News
  • Cryptocurrency
  • Fintech
  • Startups
  • Business
  • Home
  • About
  • Contact Us
  • Advert Rate
  • Terms & Conditions
  • Privacy Policy
  • SiteMap

© 2025 Techpression

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

No Result
View All Result
  • Home
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Reviews
    • How To
    • General News
  • Cryptocurrency
  • Business
  • Fintech
  • Startups
  • Featured
  • Ai
  • Tech TV

© 2025 Techpression

techpression.com
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.