HP Sure Click Secure Browsing for the Era of the Mobile Worker
HP Sure Click | Whitepaper 
L52623-001, November 2018 
HP Sure Click 
Secure Browsing for the Era of the Mobile Worker 
Introduction 
According to research from Symantec, 1 in 13 web requests leads to malware.
1
 The 
browser has become the new enterprise perimeter, a huge attack surface stretched thin by 
the need to support legacy applications and application frameworks such as JavaScript, Flash, and Java that have been exploited in the past. 
In today’s environment, users are mobile, use unprotected networks, and access increasingly complex applications from vulnerable endpoints that 
cannot be secured by traditional antivirus technologies. Fortunately, there’s a way out. 
HP Sure Click
2
 secures commonly used browsers (Internet® Explorer and Chrome™), while delivering a fast, safe, and private browsing experience. HP 
Sure Click was developed through the collaboration of HP and Bromium, the pioneers of application isolation using patented micro-virtualization 
technology. 
This revolutionary approach uses CPU features in HP PCs to automatically isolate each browser tab inside a micro-virtual machine (VM), protecting the 
endpoint from malware—even from unknown zero-day attacks that traditional, signature-based antivirus software might miss. This granular, task-
by-task isolation protects users as they work and play, delivering unparalleled security and privacy within a fast, familiar, and responsive user 
experience. 
With HP Sure Click, the endpoint device can shrug off browser-borne attacks. Malware is blocked from accessing documents, enterprise intranets, or 
even other websites, and it is automatically erased when the tab is closed, thereby eliminating costly remediation and downtime. 
The wild, wild web versus the browser 
The rapid adoption of cloud computing and software-as-a-service is fueled by dramatic changes in end-user computing. Users are increasingly 
accessing consumer and enterprise applications on the go, on untrusted networks, and often from their own personal devices. We have entered an 
era of mobile workers connected to the cloud, decreasing the relevance of traditional network protections and leaving IT security teams in the dark. 
Internet-originated “drive-by” attacks, “man-in-the-browser,” “cross-site scripting,” and other web-delivered threats have become dominant attack 
vectors. Even reputable sites have delivered malware spread by compromised advertising networks. 
The challenge 
IT security teams face a daunting series of challenges in securing their networks against modern malware intrusions, including advanced persistent 
threats (APTs), advanced targeted attacks (ATAs), polymorphic malware, and file-less intrusions. Private, corporate, and public-sector networks and 
infrastructures can become prime targets for attacks led by organized criminals, political agitators, and other hackers eager to access critical content, 
whether for espionage purposes, to cause public embarrassment, or to reap financial gain. 
1
 Symantec, Internet Security Threat Report Volume 23, 2018 
2
 HP Sure Click is available on most HP computers and supports Microsoft® Internet Explorer, Google Chrome
TM
, and Chromium™. Supported attachments include 
Microsoft Office (Word, Excel, PowerPoint) and PDF files in read-only mode, when Microsoft Office or Adobe Acrobat is installed. 




