Separating the Trusted from the Untrusted
HP Sure Click technology views the world in terms of trusted or untrusted content. Untrusted content
typically originates from outside the organization and enters via various ingress vectors, including web and
e-mail. Trusted content largely originates from known internal sources or from files that an organization’s
own users create and distribute themselves. The two types must be treated differently.
Untrusted content might contain anything at all—previously seen or unseen, detected or undetected—and
should always be regarded as potentially malicious. This content should never be granted access to the
actual host PC operation system, the file system, or the internal network. Trusted content, alternatively, can
safely execute on actual physical resources. From the user’s perspective, however, they should never see
any difference in application appearance, behavior, or workflow.
Application Isolation in Micro-Virtual Machines
The power of application isolation is simple and straightforward—
to remove the opportunity for an unknown threat to cause
harm—but the execution is quite difficult. That’s why HP
has leveraged Bromium’s unique, patented approach to
micro-virtualization at the hardware level, protecting the
host PC from below the Windows operating system,
dramatically reducing the attack surface. Untrusted
application content stays safely protected within each micro-VM. HP’s one-of-a-kind approach provides
protection-by-design against zero-day threats based on exploits in applications, browsers, and the kernel—
a trifecta that traditional and next-generation defensive solutions can’t come close to matching.
On HP Sure Click-protected endpoints, untrusted Microsoft Word documents, Adobe PDF files, and HP
Secure Browser tabs are application-isolated from each other and from the host PC—right down at the
hardware—inside of safe, disposable micro-VMs. Users can also edit and save untrusted Microsoft Word
documents right inside the micro-VM, conducting their business without workflow disruptions, knowing that
their systems are secure.
Stops Initial Infection and Self-Remediates
HP Sure Click protects against the dangerous Patient-Zero infection within the enterprise, the initial
compromised endpoint from which attackers seek to gain a foothold into the organization from which they
can then conduct reconnaissance from lateral movement and privilege escalation.
In addition to preventing malware infections at the endpoint, HP Sure Click endpoints self-remediate when
the user closes the application window or browser tab, preventing costly and time-consuming manual
remediation. Malware simply disappears forever when the micro-VM is closed, never impacting the host PC
or taking root within the organization.