Audience

Organizations in need of a complete Endpoint Protection solution

About HP Wolf Security

CPU-enforced malware prevention stops phishing and ransomware attacks, while reducing overall alert volume. Remotely locate, lock, and wipe a lost or stolen PC. HP Protect and Trace2 protects data, reduces operational burden, and can eliminate breach notifications. Continually monitors device for anomalous behavior and self-heals. HP Wolf Security brings a host of advanced technologies to your endpoint cyber-defenses, supporting HP and non-HP (OEM) PCs, and HP printers. Unlike alternatives that only protect above the operating system, HP takes a full-stack approach. HP Wolf Security1 builds security layer by layer, from motherboard hardware and firmware, through the OS, to application execution.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

HP
Founded: 1939
United States
www.hp.com/us-en/security/endpoint-security-solutions.html

Videos and Screen Captures

HP Wolf Security Screenshot 1
Other Useful Business Software
Rezku Point of Sale Icon
Rezku Point of Sale

Designed for Real-World Restaurant Operations

Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
Learn More

Product Details

Platforms Supported
Cloud
Training
Documentation
Support
Online

HP Wolf Security Frequently Asked Questions

Q: What kinds of users and organization types does HP Wolf Security work with?
Q: What languages does HP Wolf Security support in their product?
Q: What kind of support options does HP Wolf Security offer?
Q: What type of training does HP Wolf Security provide?

HP Wolf Security Product Features

Endpoint Protection

Device Management
Application Security
Signature Matching
Antivirus
Whitelisting / Blacklisting
Behavioral Analytics
Activity Log
Web Threat Management
Encryption

HP Wolf Security Additional Categories