Science and Tech

HP Wolf Protect and Trace with Wolf Connect is capable of locating, blocking and erasing a computer remotely

HP Wolf Protect and Trace with Wolf Connect is capable of locating, blocking and erasing a computer remotely

26 Apr. (Portaltic/EP) –

HP has presented this Wednesday Wolf Protect and Trace with Wolf Connect, a management connectivity solution capable of locating, blocking and erasing a computer remotely, even when it is turned off or disconnected from the Internet.

Wolf Security is a security portfolio reinforced by ‘hardware’ and security services focused on ‘endpoints’, designed to help organizations protect electronic equipment – computers, printers, etc. – from cybernetic predators.

Within this catalogue, Wolf Connec uses a mobile phone networkwhich helps ensure IT teams can manage a dispersed hybrid workforce, as well as reduce the time and effort required to resolve support tickets, protect data from loss or theft to mitigate a potential breach and optimize asset management.

This solution arises from the need to meet the needs of users in terms of hybrid work security, which “has made remote management at scale more complex, but also more essential“, as explained by the CTO of HP Iberia, Melchor Sanz.

Now the technology company has announced HP Wolf Protect and Trace with Wolf Connect, a ‘software’ service capable of locating, blocking and erasing a device remotely, even when off or unplugged of the network. With this capability, sensitive data can be protected and helps reduce IT costs by reducing the need to repair or replace computers.

PRIORITIZE ENDPOINT PROTECTION IN THE HYBRID ENVIRONMENT

The company has commented that, beyond the loss and theft of equipment, the ‘endpoint’ continues to face threats from ‘ransomware’, which is why “It is necessary to create new cybersecurity strategies and innovative tools that respond to employee behaviors,” according to this writing.

In this line, the technology manufacturer has commented that 84 percent of security managers say that these connected remote computing devices are the source of most security threats.

For that reason, “Organizations must place the ‘endpoint’ at the center of any security strategy” in hybrid work environments, according to Sanz.

Source link