HP Sure Click Secure Browsing for the Era of the Mobile Worker

HP Sure Click | Whitepaper
L52623-001, November 2018
HP Sure Click
Secure Browsing for the Era of the Mobile Worker
Introduction
According to research from Symantec, 1 in 13 web requests leads to malware.
1
The
browser has become the new enterprise perimeter, a huge attack surface stretched thin by
the need to support legacy applications and application frameworks such as JavaScript, Flash, and Java that have been exploited in the past.
In today’s environment, users are mobile, use unprotected networks, and access increasingly complex applications from vulnerable endpoints that
cannot be secured by traditional antivirus technologies. Fortunately, there’s a way out.
HP Sure Click
2
secures commonly used browsers (Internet® Explorer and Chrome), while delivering a fast, safe, and private browsing experience. HP
Sure Click was developed through the collaboration of HP and Bromium, the pioneers of application isolation using patented micro-virtualization
technology.
This revolutionary approach uses CPU features in HP PCs to automatically isolate each browser tab inside a micro-virtual machine (VM), protecting the
endpoint from malwareeven from unknown zero-day attacks that traditional, signature-based antivirus software might miss. This granular, task-
by-task isolation protects users as they work and play, delivering unparalleled security and privacy within a fast, familiar, and responsive user
experience.
With HP Sure Click, the endpoint device can shrug off browser-borne attacks. Malware is blocked from accessing documents, enterprise intranets, or
even other websites, and it is automatically erased when the tab is closed, thereby eliminating costly remediation and downtime.
The wild, wild web versus the browser
The rapid adoption of cloud computing and software-as-a-service is fueled by dramatic changes in end-user computing. Users are increasingly
accessing consumer and enterprise applications on the go, on untrusted networks, and often from their own personal devices. We have entered an
era of mobile workers connected to the cloud, decreasing the relevance of traditional network protections and leaving IT security teams in the dark.
Internet-originated “drive-by” attacks, “man-in-the-browser,” “cross-site scripting,” and other web-delivered threats have become dominant attack
vectors. Even reputable sites have delivered malware spread by compromised advertising networks.
The challenge
IT security teams face a daunting series of challenges in securing their networks against modern malware intrusions, including advanced persistent
threats (APTs), advanced targeted attacks (ATAs), polymorphic malware, and file-less intrusions. Private, corporate, and public-sector networks and
infrastructures can become prime targets for attacks led by organized criminals, political agitators, and other hackers eager to access critical content,
whether for espionage purposes, to cause public embarrassment, or to reap financial gain.
1
Symantec, Internet Security Threat Report Volume 23, 2018
2
HP Sure Click is available on most HP computers and supports Microsoft® Internet Explorer, Google Chrome
TM
, and Chromium™. Supported attachments include
Microsoft Office (Word, Excel, PowerPoint) and PDF files in read-only mode, when Microsoft Office or Adobe Acrobat is installed.

Summary of content (4 pages)