• About
  • Advertise
  • Careers
  • Contact Us
Thursday, June 12, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
ADVERTISEMENT
Home Business Security

HP Expands Boundaries for Remote PC Management through HP Wolf Connect

by Peter Oluka
March 31, 2023
in Security
0
HP Expands Boundaries for Remote PC Management through HP Wolf Connect
HP Wolf Connect

HP Wolf Connect

UBA
Advertisements
  • As HP Wolf Protect & Trace with Wolf Connect becomes the world’s first software service capable of locating, locking and erasing a PC remotely, even when powered down or disconnected from the Internet

HP Inc., on Thursday  at its Amplify Partner Conference unveiled the HP Wolf Connect, an IT management connectivity solution that provides a highly resilient and secure connection to remote PCs, enabling IT to manage devices even when powered down or offline.

Using a cellular-based network, HP Wolf Connect’s robust connectivity helps ensure IT teams can readily manage a dispersed hybrid workforce.

It can reduce the time and effort needed to resolve support tickets, secure data from loss or theft to mitigate a potential breach and optimize asset management.

“Hybrid work has made remote management at scale more complex, yet more essential,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc. “The cloud has helped but hasn’t solved IT’s ability to manage devices that are powered down or offline. HP Wolf Connect’s highly resilient connection opens new doors to remote device management, enabling efficient and effective management of dispersed workforces.”

HP Wolf Protect and Trace with Wolf Connect is the world’s first software service capable of locating, locking and erasing a PC remotely, even when it’s turned off or disconnected from the Internet. This capability protects sensitive data on the move and helps lower IT costs by reducing the need for PC remediation or replacement.

Securing and managing the hybrid workforce is a top priority for organizations. New global research from HP Wolf Security found 82% of security leaders operating a hybrid work model have gaps in their organization’s security posture. The global study of 1,492 security leaders found:

  • 61% say protecting their hybrid workers will get harder in the year ahead. 
  • 70% say that hybrid work increases the risk of lost or stolen devices. 

“IT teams need a better way to deal with the increase in lost or stolen devices,” Pratt said. “Before today, solutions relied on PCs being on or connected to the internet, but HP Wolf Connect now provides a highly resilient mobile connection to find, lock, and erase lost or stolen devices even if they are disconnected or powered down.

Pratt continues; “This is particularly crucial in industries where devices may contain PII (personally identifiable information) or intellectual property. By adding Wolf Connect to HP Wolf Protect and Trace, teams can accurately report where and when devices were lost, and how long it took to lock or erase them.”

Securing the endpoint is ground zero for attacks on hybrid workers 

Beyond PC loss and theft, the endpoint i.e., laptops, PCs or printers – continue to face serious threat from ransomware and is ground zero for attacks on hybrid workers. This requires the creation of new cybersecurity strategies and innovative security tools in response to changing employee behaviours.

  • 84% of security leaders say the endpoint is the source of most security threats and where the most business-damaging security threats happen. 
  • 66% say the greatest cybersecurity weakness is the potential for hybrid employees to be compromised; with phishing, ransomware, and attacks via unsecured home networks cited as the top risks. 
  • 65% say it is challenging to update their threat detection measures (e.g., Endpoint Detection & Response and Security Information and Event Management tools) to reflect the behavior of hybrid employees, making it harder to spot attacks. 
  • Three-quarters (76%) of security leaders agree application isolation is key to protect hybrid worker devices, but only 23% are benefiting from using it at present; with 32% planning to deploy in the next 12 months.

“The shift to hybrid work requires a move away from old perimeter-focused thinking. To close gaps, organizations must put the endpoint front and center of any security strategy. Adopting hardware-enforced security features and protection above, in, and below the OS – such as application isolation – will be key for protecting users without impinging on the freedoms that hybrid work allows,” concludes Pratt.

Hybrid work security is a key focus for 2023  

HP’s new hybrid security research details how security teams are prioritizing securing the hybrid workplace:

  • Four-in-five (82%) security leaders have increased their cybersecurity budget specifically for hybrid workers. 71% expect this hybrid investment focus to increase further in 2023. 
  • 80% have deployed a different set of tools and policies to protect hybrid employees. 
  • 70% are limiting network access of people working remotely to minimize the risk of a breach.

Loading

Advertisements
MTN ADS

Author

  • Peter Oluka
    Peter Oluka

    Peter Oluka (@peterolukai), editor of Techeconomy, is a multi-award winner practicing Journalist. Peter’s media practice cuts across Media Relations | Marketing| Advertising, other Communications interests. Contact: peter.oluka@techeconomy.ng

    View all posts
0Shares
Tags: HP Wolf Connect
Peter Oluka

Peter Oluka

Peter Oluka (@peterolukai), editor of Techeconomy, is a multi-award winner practicing Journalist. Peter’s media practice cuts across Media Relations | Marketing| Advertising, other Communications interests. Contact: peter.oluka@techeconomy.ng

Next Post
UNICCON Group Launches SmartAfri Labs

Blockchain: UNICCON Group Launches SmartAfri Labs

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recommended

NACCIMA President

Strengthening Cooperatives will Boost SMEs – NACCIMA

10 months ago
NiRA .NG Domain Reseller programme

.NG Domain Registrations Hit 215,000

1 year ago

Popular News

    Connect with us

    Currently Playing

    TE Weather

    TE PODCAST

    Techeconomy Podcast
    Techeconomy Podcast

    Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

    Follow us @techeconomyng for more.

    Listen OnSpotify
    TECH TALK EPISODE 2
    byTecheconomy

    PRODUCTIVITY AND WORK-Life Balance

    TECH TALK EPISODE 2
    Episode play icon
    TECH TALK EPISODE 2
    Episode Description
    Episode play icon
    CYBERSECURITY ESSENTIALS
    Episode Description
    Episode play icon
    Digital Marketing Trends and strategies for 2025 and beyond
    Episode Description
    Episode play icon
    Major Lesson for Techies in 2024 and Projections for 2025
    Episode Description
    Episode play icon
    Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
    Episode play icon
    Maximizing Profitability Through Seasonal Sales: Strategies For Success
    Episode play icon
    Techeconomy Business Series
    Episode Description
    Episode play icon
    PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
    Episode Description
    Episode play icon
    Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
    Episode Description
    Episode play icon
    The Role of Ed-tech in Life Long Learning and Continuous Education
    Episode Description
    Search Results placeholder
    • About
    • Advertise
    • Careers
    • Contact Us

    © 2017 TECHECONOMY.

    No Result
    View All Result
    • News
    • Tech
      • DisruptiveTECH
      • ConsumerTech
      • How To
      • TechTAINMENT
    • Business
      • Mobility
      • Environment
      • Travel
      • StartUPs
    • Economy
    • TECHECONOMY TV
    • TBS
    • About Us
    • Contact Us

    © 2017 TECHECONOMY.

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Translate »