Personal Systems

Stay secure and connected, choose from a wide range of Laptops, Tablets, Desktops, Workstations and Thin Client devices.

The threat of cybercrimes targeting PCs looms larger than ever before. In fact, a staggering 68% of organizations have reported compromised laptops within the last 24 months. Cybercriminals are attacking unprotected devices every day to unleash malware attacks to steal password credentials, lockdown the PC’s BIOS and hold it for ransom, or gain access to your organization’s network to steal sensitive data. Thankfully, today’s PC security technology offers proven options for safeguarding your organization’s PC devices, data and identity passcodes.

Malware Protection

Malware today is being designed to attack your PC at its very foundation – the BIOS. The BIOS is the first code that runs when your PC is turned on, even before the OS (Operating system). A successful attack on the BIOS can be undetectable with antivirus programs and can even survive a disk wipe / OS reinstall.

More Information >

Multifactor Authentication

Passwords no longer provide the level of security required for today’s security threats and can easily be hacked. Weak passwords are a popular attack vector for hackers. Combining 2 authentication factors makes it a million times harder to hack passwords1

More Information >

Visual Hacking

Mobile workers in public locations are at risk of onscreen data being stolen by a visual hacker.

In a recent study, 91% of visual hacking attempts were successful3

With 60% of people taking their work outside of office walls4, the potential risk is significant.

More Information >

Laptops & Tablets

Whether you’re seeking the exquisite craftsmanship and unquestionably durability of HP’s Elite series or the intuitiveness and reliability of its Pro series — HP laptops and tablets combine sleek style and powerful performance to keep up with you in or out of the office.

Desktops

Choose from a wide range of desktops for your needs. From HP ProDesk desktops that fit your budget and your needs with stylish design offering increased flexibility for a variety of hardware configurations — durable, space-saving HP EliteDesk desktops that offer top-notch productivity plus industry-leading reliability, security, and manageability.

Workstations

Equipped to handle the most complex data, designs and information, HP Workstations have been on the market for over 30 years helping you to be inspired and are designed to deliver high performance and reliability with the latest innovation and industry leading technologies.

Thin Clients

Stay secure, connected and confident with the industry’s widest selection of desktop, mobile and tablet thin clients. Plus, with HP’s exclusive industry-leading software you can streamline deployment, enhance user experience and enable smooth device management.

Security Solutions

Security is an ever-changing industry. In order to stay ahead of threats, you need to know the latest technology to reduce the risks of attacks, particularly through device end-points. Critical gaps can occur at multiple points within your organization.

Prevent Phishing Scams

Many believe that breaches in cybersecurity result from expert hackers using sophisticated techniques and high-tech equipment. In reality, the vast majority of successful hacks happen as a result of someone failing to install a routine security patch or falling victim to a phishing attack. Both of these can be prevented.

Phishing attacks usually involve some form of social engineering. Phishing involves an attacker attempting to retrieve data, usually login credentials, from a user. The term implies that a hacker is setting a trap and enticing a user to take the bait.

Email phishing scams have become quite common. This type of attack involves sending an email to a particular person. The email will contain either a file to download, a link to click, or a request for some personal information. The file will often contain malware, as will the site that the link directs to.

With HP Sure Click when a user clicks on a link, each web browser tab is opened automatically in a CPU-isolated Micro Virtual Machine. Malware impacting one tab has no impact on any the tab, app or the OS. Just close the tab and the malware is gone.

Multifactor Authentication - Add Multiple Layers of Security

A strong password is one of the most effective ways to ensure your device is secure. However, some hackers can steal passwords or brute-force into systems by guessing passwords using powerful software. How does HP security address this concern?

HP multifactor authentication adds an additional layer of security to stop hackers in their tracks. With HP multifactor authentication, simply having a password is not enough to gain access to critical data or infrastructure. This security measure uses an additional form of authentication on top of a password requirement. For example, this could include fingerprint verification.
By adding the second layer of verification, security is tightened and the risk due to lost passwords or dedicated hackers is minimized. Enabling HP multifactor authentication is one of the most effective HP security features that users can easily implement into their day-to-day device usage.

Protecting the BIOS against Malware

The BIOS (basic input/output system) is a blueprint for booting up a computer. It is the program a personal computer’s microprocessor uses to get the computer system started after you turn it on and initiates firmware while loading critical hardware components.

If the BIOS is corrupted, other protection is moot, leaving the PC completely non-operational providing hackers an opportunity to steal credentials and data or insert ransomware.

HP Sure Start technology works constantly, without user intervention, making sure that there are no compromised BIOS files that have taken root in the device. If a corrupt version of the BIOS does wind up being detected, the device automatically restarts using a clean copy of the BIOS.

Be Confident When Booting Up Your Device

What happens when the programs meant to protect your device are turned against you? This is the goal of many types of malware that actually target anti-malware applications on your computer. By targeting the protections you have in place, malware can ensure you are unable to remove it.

HP SureRun ensures that when you boot up your device, it is protected. This hardware-enforced security measure stops hackers from destroying the protections you trust to secure your data and your privacy. HP SureRun protects critical processes and prevents malware from making changes which would allow it to take over your system.

Preventing Visual Hacking

Mobile workers in public locations are at risk of onscreen data being stolen by a visual hacker. In a recent study, 91% of visual hacking attempts were successful 3 With 60% of people taking their work outside of office walls4, the potential risk is significant. HP Sure View provides built in privacy screen prevents visual hacking. It’s as simple as pressing FN + F2, visual protection starts when others are 35 degrees from the center and reduces up to 95% of the visible light and prying eyes seeing a dark screen.

1. Assuming a brute-force attack where both authentication factors are 10-character passwords in a 94 character alphabet using NIST SP 800.63-2 estimates for password guessing entropy, each password is an aggregate of characters selected at random from the alphabet, the passwords are separately selected and unrelated to each other, and the system protected by the two authentication factors requires that both factors to be correctly entered before granting access to the protected resource.
2. Verizon, 2016 Data Breach Investigations Report, 2016. http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
3. Average based on global trials conducted by Ponemon Institute during the “Visual Hacking Experiment,” 2015, and the “Global Visual Hacking Experiment,” 2016, both sponsored by 3M. http://multimedia.3m.com/mws/media/1254234O/global-visual- hacking-experiment-infographic.pdf
4. Pew Research Center, Technology’s impact on Workers, December 2014
5. SANS, Endpoint Security Survey, 2016
6. Ponemon Institute, Cost of Data Breach Study Global Analysis, 2016