secure
Threat Protection

Address security issues at the hardware level. HP EliteBook devices come equipped with hardwarre-level contingencies that isolate malicious browser activities, perform health checks on every startup and keep your screen private.

Take the guesswork out of the equation and keep your people working with these built-in security features.

HP Sure View
sureview

This integrated privacy screen denies onlookers and visual hackers from reading vmaterial on the screen.

Visual Hacking are often never reported - taking place anywhere, in just minutes.

  • Attempts are successful 90% of the time,
  • Approximately 33% of visual hacks end up revealing sensitive or confidential information
Browser Threats can circumvent traditional security firewalls, making this threat incredibly challenging to detect and circumvent.
  • 81% of IT professionals say unsecure web browsers area primary vector of attack
  • Nearly 90% of IT professionals believe their organization has been breached
HP Sure Click
sureclick

Add contingencies and isolate vulnerabilities that stem from browser-born threats like malware, ransomware and viruses.

HP Sure Start
surestart

HP devices include BIOS scrubbers on startup as a hardware-software based solution. This approach scans the BIOS on every startup, and automatically restore the BIOS to factory specs when an intrution is detected.

BIOS Attacks are devious strategies used to hack into the system's management consoles of a

  • Bios attacks have increased 123% year-over-year since 2016
  • Tests find 80% of computers had exploitable vulnerabilities at the BIOS level
HP Ultra-Secure Devices
one
Save $107.01
EliteBook 840 G3
Price: $1,45399
two
Free Shipping
EliteBook 840 G4
Price: $1,55699
three
Free Shipping
EliteBook x360
Price: $1,83799
four
Save $107.01
EliteBook 1040
Price: $1,60299
By: Renes Marsh
Laptop Security Aboard Airplans
Homeland Security Secretary John Kelly announced new aviation security measures Wednesday impacting overseas airports that have direct flights to the United States.
88
By: Tara Seals
Visual hacking successful 91% of the time
As organizations double down on cybersecurity measures, low-tech attack methods such as visual hacking—i.e., physically spying what's on others' computer screens and desks—are becoming more common.
93
By: Bruce Sheneier
BIOS Attacks - no longer the realm of the NSA, threatening 9 in 10 computers
The BIOS boots a computer and helps load the operating system. By infecting this core software, which operates below antivirus and other security products and therefore is not usually scanned by them, spies can plant malware that remains live and undetected even if the computer's operating system were wiped and re-installed.
78
By: Lily Hay Newman
Cyber Security Disasters of 2017 so far
A woman sits backdropped by a real time cyber attacks world map, at the headquarters of Bitdefender in Bucharest, Romania, Wednesday, June 28, 2017. A new, highly virulent strain of malicious ransom software that is crippling computers globally appears to have been sown in Ukraine, where it badly hobbled much of the government and private sector on the eve of a holiday celebrating a post-Soviet constitution.
102
By: Spikes Security
Browser-Borne and Browser tab attacks are an increasing concern
Long-Trusted Detection Technologies Increasingly Ineffective, Says 75%+ of IT and Security Professionals in Findings Released by Spikes Security and Ponemon Institute.
54
By: Bruce Sheneier
Hacker claims to have penetrated over 150,000 printers
Over the weekend, a hacker who goes by the name Stackoverflowin claimed he hacked 150,000 insecure printers in an effort “to raise everyone's awareness towards the dangers of leaving printers exposed online without a firewall or other security settings enabled.
48
By: Jessica Davis
Visual hacking grows to be a far bigger threat than most suspect
Ponemon's 2016 Global Visual Hacking Experiment found it takes less than 15 minutes to complete an initial hack by actually eyeballing certain types of information and such attempts were successful 91 percent of the time.
46
By: Acrodex
Blog Post About Security - Cases of IT Failure to learn from
Most recently, Equifax suffered a massive breach that could impact millions of people. Today, we'll be examining this event and learn what kinds of operational failures caused this event to occur and what security lessons we can learn.
67