HP Expands the Boundaries for Remote PC Management through HP Wolf Connect

News Highlights 

  • New IT management connectivity solution for remote PC management
  • The first find, lock, erase software service even for disconnected, powered down PCs
  • New global hybrid security research reveals 82% of businesses have security gaps

CHICAGO, March 29, 2023 (GLOBE NEWSWIRE) -- Today at its Amplify™ Partner Conference, HP Inc (NYSE: HPQ) announced HP Wolf Connect, an IT management connectivity solution that provides a highly resilient and secure connection1 to remote PCs, enabling IT to manage devices even when powered down or offline.

Using a cellular-based network, HP Wolf Connect’s robust connectivity1 helps ensure IT teams can readily manage a dispersed hybrid workforce. It can reduce the time and effort needed to resolve support tickets, secure data from loss or theft to mitigate a potential breach and optimize asset management.

“Hybrid work has made remote management at scale more complex, yet more essential,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc. “The cloud has helped but hasn’t solved IT’s ability to manage devices that are powered down or offline. HP Wolf Connect’s highly resilient connection opens new doors to remote device management, enabling efficient and effective management of dispersed workforces.”

HP Wolf Protect and Trace with Wolf Connect is the world's first software service capable of locating, locking and erasing a PC remotely, even when it’s turned off or disconnected from the Internet.2 This capability protects sensitive data on the move and helps lower IT costs by reducing the need for PC remediation or replacement.

Securing and managing the hybrid workforce is a top priority for organizations. New global research from HP Wolf Security found 82% of security leaders operating a hybrid work model have gaps in their organization’s security posture.3 The global study of 1,492 security leaders found:

  • 61% say protecting their hybrid workers will get harder in the year ahead.3
  • 70% say that hybrid work increases the risk of lost or stolen devices.3

“IT teams need a better way to deal with the increase in lost or stolen devices,” continues Pratt. “Before today, solutions relied on PCs being on or connected to the internet, but HP Wolf Connect now provides a highly resilient mobile connection to find, lock, and erase lost or stolen devices even if they are disconnected or powered down.”

Pratt continues, “This is particularly crucial in industries where devices may contain PII (personally identifiable information) or intellectual property. By adding Wolf Connect to HP Wolf Protect and Trace, teams can accurately report where and when devices were lost, and how long it took to lock or erase them.”

Securing the endpoint is ground zero for attacks on hybrid workers

Beyond PC loss and theft, the endpoint i.e., laptops, PCs or printers – continue to face serious threat from ransomware and is ground zero for attacks on hybrid workers. This requires the creation of new cybersecurity strategies and innovative security tools in response to changing employee behaviors.

  • 84% of security leaders say the endpoint is the source of most security threats and where the most business-damaging security threats happen.3
  • 66% say the greatest cybersecurity weakness is the potential for hybrid employees to be compromised; with phishing, ransomware, and attacks via unsecured home networks cited as the top risks.3
  • 65% say it is challenging to update their threat detection measures (e.g., Endpoint Detection & Response and Security Information and Event Management tools) to reflect the behavior of hybrid employees, making it harder to spot attacks.3
  • Three-quarters (76%) of security leaders agree application isolation is key to protect hybrid worker devices, but only 23% are benefiting from using it at present; with 32% planning to deploy in the next 12 months.3

“The shift to hybrid work requires a move away from old perimeter-focused thinking. To close gaps, organizations must put the endpoint front and center of any security strategy. Adopting hardware-enforced security features and protection above, in, and below the OS – such as application isolation – will be key for protecting users without impinging on the freedoms that hybrid work allows,” concludes Pratt.

Hybrid work security is a key focus for 2023

HP’s new hybrid security research details how security teams are prioritizing securing the hybrid workplace:

  • Four-in-five (82%) security leaders have increased their cybersecurity budget specifically for hybrid workers. 71% expect this hybrid investment focus to increase further in 2023.3
  • 80% have deployed a different set of tools and policies to protect hybrid employees.3
  • 70% are limiting network access of people working remotely to minimize the risk of a breach.3

To learn more, download HP Wolf Security’s latest report for IT decision makers and for Security Leaders.

Methodology

HP surveyed more than 1,492 IT and security leaders in hybrid organizations globally across 5 markets (US, UK, France, Germany, and Japan) in July-August 2022. All are decision makers for endpoints, network, cloud, or privacy management, and oversee or manage a cybersecurity operations team and/or IT hardware and software within their organization. Hybrid organizations are defined as having a range of employees who either work in the office, work remotely or a mixture of both.

About HP

HP Inc. (NYSE: HPQ) is a global technology leader and creator of solutions that enable people to bring their ideas to life and connect to the things that matter most. Operating in more than 170 countries, HP delivers a wide range of innovative and sustainable devices, services and subscriptions for personal computing, printing, 3D printing, hybrid work, gaming, and more. For more information, please visit: http://www.hp.com.

About HP Wolf Security

HP Wolf Security is a portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. Visit https://www.hp.com/uk-en/security/endpoint-security-solutions.html.

Media Contacts
HP Media Relations
Email Contact
hp.com/go/newsroom

Resources:

____________________________________
1
Based on HP’s platform root of trust and HP device ability to connect even when disconnected from the Internet or powered off. Devices with Cat-M module do not support Internet access. Internet service for devices with 4G LTE and 5G modules is not included and must be purchased separately.
2 Based on HP's internal analysis of find, lock and erase software services for PCs as of March 2023.
3 Based on a HP survey of more than 1,492 IT and security leaders in hybrid organizations across 5 markets (US, UK, France, Germany, and Japan) in July-August 2022.


Primary Logo

Featured Video
Jobs
GIS Specialist for Washington State Department of Natural Resources at Olympia, Washington
Business Development Manager for Berntsen International, Inc. at Madison, Wisconsin
Business Technology Analyst for Surface Water Management at Everett, Washington
Mechanical Test Engineer, Platforms Infrastructure for Google at Mountain View, California
Machine Learning Engineer 3D Geometry/ Multi-Modal for Autodesk at San Francisco, California
Mechanical Engineer 3 for Lam Research at Fremont, California
Upcoming Events
Dimensions User Conference 2024 at The Venetian Resort Las Vegas NV - Nov 11 - 13, 2024
URISA GIS Leadership Academy at Embassy Suites Fort Worth Downtown 600 Commerce Street Fort Worth, TX - Nov 18 - 22, 2024



© 2024 Internet Business Systems, Inc.
670 Aberdeen Way, Milpitas, CA 95035
+1 (408) 882-6554 — Contact Us, or visit our other sites:
AECCafe - Architectural Design and Engineering EDACafe - Electronic Design Automation TechJobsCafe - Technical Jobs and Resumes  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy PolicyAdvertise