UNDER ATTACK: MALICIOUS DOWNLOADS ORIGINATE FROM MANY SOURCES




ways, including:
Web browsing
Clicking on shared links



websites are so abundant, short-lived, and contain content





Deliberate downloads:

Fake executable updates: User is tricked into downloading

Links to documents:


URL redirects: Initial link redirects the user to an alternate URL

Bad DNS:

Bogus drivers and utilities:

Watering-hole attacks:


DEFEND AGAINST
MALICIOUS DOWNLOADS
WITH VERIFIED NATIVE
APPLICATION
PERFORMANCE AND
USABILITY
SAFELY DOWNLOAD
AND OPEN DOCUMENTS
AND EXECUTABLE FILES
FROM UNKNOWN OR
UNCATEGORIZED
WEBSITES
ELIMINATE RESTRICTIVE
IT SECURITY POLICIES
THAT LIMIT USER ACCESS
TO DOWNLOADED FILES,
AND INHIBIT
WORKFLOWS
SOLUTION BRIEF
HP SURE CLICK ENTERPRISE
POWERE BY
PROTECT AGAINST MALICIOUS
DOCUMENT AND FILE DOWNLOADS
HP WOLF ENTERPRISE SECURITY
APPLICATION ISOLATION:
PROTECT BEFORE YOU DETECT
HP SURE CLICK ENTERPRISE, POWERED BY BROMIUM,
USES APPLICATION ISOLATION TO PROTECT
ORGANIZATIONS FROM DOWNLOAD THREATS



intelligence to help strengthen organizational security posture.










AUTOMATICALLY PROTECT ALL WEB DOWNLOADS



STREAMLINE IT SECURITY AND REDUCE COSTS




ACHIEVE LASTING PROTECTION
WITH HARDWARE-ENFORCED SECURITY



SHARE REAL-TIME THREAT INTELLIGENCE
38% OF
MALWARE IS
NOW BEING
DISGUISED
AS A WORD
DOCUMENT.
1

IN 2020,
PHISHING
SITES HAVE
SEEN AN
INCREASE
OF MORE
THAN 750%
SINCE
2007.
2









//www.hp.com/enterprisesecurity