4aa7 4555enw
4aa7 4555enw
4aa7 4555enw
TECHNICAL WHITEPAPER
PROTECT AGAINST
MALWARE
Recent security-focused advances to modern
browsers have caused attackers to shift their
focus to document-based attacks.
TABLE OF CONTENTS
INTRODUCTION ...................................................................................................................................... 2
ABOUT HP .............................................................................................................................................. 6
Because more people are working from home today, they are inadvertently using
unprotected home networks and accessing increasingly complex applications from
vulnerable endpoints. Whereas enterprise networks frequently employ products to shield
endpoints from attacks, over 80% of home office routers have been found to be vulnerable
to potential cyberattacks3. This increases security risks for organizations, as compromised
endpoints could leak sensitive data, or even carry malware into the corporate network the
next time users connect physically or via VPN. Fortunately, there’s a way out.
HP Sure Click3, 4 secures commonly used document types (Microsoft Word and PDF)
while delivering a safe and private ChromiumTM-based secure browser. HP Sure Click was
originally developed through a collaboration between HP and Bromium, the pioneers of
application isolation using micro-virtualization technology.
With HP Sure Click, the endpoint device is able to shrug off browser-borne attacks—
malware is blocked from accessing documents, enterprise intranets, even other
websites, and is automatically erased when the tab is closed, thereby eliminating costly
remediation and downtime.
MOTIVES BEHIND PUBLIC THE LEGACY APPROACH IS NOT UPTO THE TASK
ADMINISTRATION
SECURITY BREACHES Detection-based security solutions protect against the vast majority of known attacks
but struggle to resolve the new, unknown attacks. When an antivirus relies on matching
• 44% Espionage against signatures, heuristics, behaviors, or other attributes that have previously been
• 36% Financial identified, novel threats will always be a risk. Even next-generation antivirus software
• 14% Fun (breaches)5 does not enable detection-based solutions to match the rapid innovation of exploits and
techniques. As a result, businesses need to be able to protect against new threats that
have never been seen before, including new breeds of file-less malware and malicious
code that runs only in memory.
A CRISIS IN PATCHING
According to HP Security Research, Cyber Security 2016, the top 10 exploited
vulnerabilities were all over a year old, and most have had patches available for months
or even years. The 2017 devastating WannaCry ransomware outbreak leveraged a
Server Message Block (SMB) vulnerability impacting all Windows versions dating back to
Windows XP. Microsoft had already made a patch available, but many devices remained
unpatched with devastating consequences.
Verizon research indicates that only 33% of public sector systems are patched in a timely
manner6, leaving critical systems—their valuable data and intellectual property—
vulnerable to countless old and new exploits (Verizon’s measure for “timely” patch cycles
averages 12 weeks, even as Microsoft and other vendors offer monthly patches).
APPLICATION ISOLATION IN
MICRO-VIRTUAL MACHINES
The power of application isolation is simple and straightforward—to remove the
opportunity for an unknown threat to cause harm—but the execution is quite
difficult. That’s why HP has leveraged Bromium’s unique, patented approach to
micro-virtualization at the hardware level, protecting the host PC from below the
Windows operating system, dramatically reducing the attack surface. Untrusted
application content stays safely protected within each micro-VM. HP’s one-of-a-kind
approach provides protection-by-design against zero-day threats based on exploits in
applications, browsers, and the kernel—a trifecta that traditional and next-generation
defensive solutions can’t come close to matching.
In addition to preventing malware infections at the endpoint, HP Sure Click endpoints self-
remediate when the user closes the application window or browser tab, preventing costly
and time-consuming manual remediation. Malware simply disappears forever when the
micro-VM is closed, never impacting the host PC or taking root within the organization.
HP Sure Click reduces and streamlines investigation and remediation downtime. Because
HP Sure Click automatically protects endpoints and self-remediates every time users
close the micro-VMs containing malicious documents or web pages, the organization’s
actual remediation efforts can be reduced to the remaining non-HP Sure Click-protected
endpoints and other attack vectors.
THE SOLUTION
HP Sure Click leverages virtualization-based security and isolation technology to
dramatically decrease attack surfaces, monitor suspicious activity, and contain threats
while users are online or offline, as micro-VMs are not dependent on online access to
protect your device from malware.
Secure Files
Malicious documents have gained popularity with threat actors due to their effectiveness.
Ransomware is commonly delivered via malicious office documents or PDFs. HP Sure
Click hardware-isolates each supported document from the operating system and the
kernel. If a malicious document is saved via an ingress application—such as web
download, email, or Skype—it is hardware-isolated in a micro-VM. When the document is
closed, the threat is terminated along with the micro-VM.
ABOUT HP
HP Inc. creates technology that makes life better for everyone, everywhere. Through
our portfolio of printers, PCs, mobile devices, solutions, and services, we engineer
experiences that amaze.
1
Symantec, Internet Security Threat Report Volume 23, 2018
2
Bromium (Sure Click and Sure Click Enterprise) 2019
3
https://www.theamericanconsumer.org/wp-content/uploads/2018/09/FINAL-Wi-Fi-Router-Vulnerabilities.pdf
4
HP Sure Click is available on select HP PCs and requires Windows 10. See https://bit.ly/2PrLT6A_SureClick for complete details.
5
Verizon, 2018 Data Breach Report, 2018; Page 41
6
Verizon, 2017 Data Breach Report, 2017; Page 13
7
Symantec, Internet Security Threat Report Volume 23, 2018
8
Verizon, 2017 Data Breach Report, 2017
9
Ponemon Institute, 2015 Cost of Malware Containment; page 1
© Copyright 2021 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for
HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Wi-Fi®
is a registered trademark of the Wi-Fi Alliance.