The Evolution of Remote Security: Learnings from HP Amplify 2023

How can security and vulnerabilities be managed for offline devices?

April 26, 2023

The Evolution of Remote Security: Learnings from HP Amplify 2023

On March 15, 1996, a Fidelity Investments employee had a personal laptop stolenOpens a new window after leaving it in a rental car while eating dinner at a California restaurant. Less than two weeks later, his employer sent a letter to 196,000 Hewlett-Packard Co. employees, informing them their records were part of a data breach.

In the 27 years since then, and especially with the pandemic driving more work out of the office, the risk of data breach by stolen laptops has only worsened. Millions of laptops are stolen each year, and according to a 2019 Forrester report, 15% of data breaches can be traced back to lost or stolen laptops. HP’s own global study of security leaders conducted last summer shows that 84% of security leaders say the endpoint is the source of most security threats and where the most business-damaging security threats happen. 

Too often, companies find themselves in the same position that Fidelity Investment did. An employee calls in about a lost device with personally identifiable information on it. The company can’t be sure whether the data on it remains safe and must send a data breach notification to those affected. The fallout often involves reputational damage, legal investigations, and operational losses. 

“Imagine how much harder the job of securing a device is when that device isn’t in the office once a week, or once a month,” says Joanna Burkey, the chief information security officer at HP, on stage at HP Amplify on March 29 in Chicago. “Wolf Connect removes that friction because the state and location of the device doesn’t matter.” 

Wolf Protect & Trace with Wolf Connect brings the ability to locate, lock, and wipe a laptop remotely, even if it is offline and even if it is powered off.  It’s a kill command that could have protected those employees that had their sensitive information scooped by a common ring of laptop thieves all those years ago. 

Released on March 29, Wolf Connect is a new product focused on endpoint security. It helps IT administrators with asset management by providing a dashboard to manage devices, no matter where they happen to be located. The devices can be managed even when not connected to the internet or powered on because the solution uses a cellular network for telemetry. As a result, only specific laptops can be managed in this way. 

See More: How Security Leaders Can Handle the Risky Behavior of Remote Workers

Building Unique Security Capability

 

JG-uses-Wolf-Connect-1024x771 image

Jonathan Gohstand, director of technical product marketing at HP, demonstrates the HP Wolf Connect Protect & Trace feature at HP Amplify in Chicago, March 29, 2023

“If you have the regular broadband card for internet access, we can leverage that,” explains Jonathan Gohstand, director of technical product marketing at HP, “but most people don’t put that in their PCs… So there will be a different option, which is a low-cap, low-cost, dedicated-cellular card that can only be used for this Wolf Connect telemetry.”

Customers will not incur any additional costs as the required cellular subscription is managed by the company in the background. The first compatible laptops for the service are the HP G10 product line and the ProBook 400 series and above, he says.

“We change the wiring on the motherboard to get the permanent connection to the battery,” Gohstand says. “So if you power down, the radio still has power, and the little security controller still has power.” 

Protect & Trace’s capability to lock and wipe a device is the first feature coming to the Wolf Connect platform, he adds. It will be available for use by the third quarter of 2023. More features will be rolled out to the Wolf Connect service eventually, but HP wants to see customers buy into it first. HP is yet to finalize pricing for adding the cellular module to a new laptop order.

“People value both the data on the PCs and the PC asset itself,” Gohstand says. “It’s just an obvious extension of manageability against the PC.”

See More: Security in an Increasingly Distributed-Workforce World

Similar Solutions Depend on the Internet To Deliver Commands 

Other PC vendors have offered a poison pill provision, but none have been able to deliver the capability for offline devices. 

Lenovo’s Computrace is embedded below the operating system layer as well, into the system bios, and allows management functions, including tracing and locking a laptop. It requires the device to be connected to the internet to deliver commands. Intel’s vPro chips also provide hardware-layer access to Windows devices for remote management and can even allow for powered-off laptops to be managed. But the functionality relies on internet connectivity to deliver KVM Over IP. 

Wolf Connect offers a new remote management capability that just wasn’t possible before. It may appeal to certain enterprises with large laptop fleets that have been plagued by data breaches related to lost or stolen devices, such as government or financial institutions. The remote lock and wipe capability is a clear high-value starting point for the industry at large. 

It will be interesting to see what new capabilities and solutions in the remote security management space will emerge in the future. One could imagine critical updates being pushed, emergency messages being sent, or configuration updates all managed remotely soon. 

What are your thoughts on the evolution of remote security management? Share with us on FacebookOpens a new window , TwitterOpens a new window , and LinkedInOpens a new window . We’d love to hear from you!

Image Source: Shutterstock

MORE ON REMOTE SECURITY

About Expert Contributors: The Expert Contributor program is designed to help kickstart meaningful conversations around the priorities and challenges most critical to C-level executives. The insights and perspectives will help CIOs tackle what’s most important to them. We are always looking for industry thinkers who can help set the narrative for our enterprise audience. To know more about this program, and submit your ideas, reach out to the Spiceworks News & Insights Editorial team at editorial-toolbox@ziffdavis.comOpens a new window

Brian Jackson
Brian Jackson

Research Director, Info-Tech Research group

As a Research Director in the CIO practice, Brian focuses on emerging trends, executive leadership strategy, and digital strategy. After more than a decade as a technology and science journalist, Brian has his fingers on the pulse of leading-edge trends and organizational best practices towards innovation. Prior to joining Info-Tech Research Group, Brian was the Editorial Director at IT World Canada, responsible for the B2B media publisher’s editorial strategy and execution across all of its publications. A leading digital thinker at the firm, Brian led IT World Canada to become the most award-winning publisher in the B2B category at the Canadian Online Publishing Awards. In addition to delivering insightful reporting across three industry-leading websites, Brian also developed, launched, and grew the firm’s YouTube channel and podcasting capabilities. Brian started his career with Discovery Channel Interactive, where he helped pioneer Canada’s first broadband video player for the web. He developed a unique web-based Live Events series, offering video coverage of landmark science experiences including a Space Shuttle launch, a dinosaur bones dig in Alberta’s badlands, a concrete canoe race competition hosted by Survivorman, and FIRST’s educational robot battles. Brian holds a Bachelor of Journalism from Carleton University. He is regularly featured as a technology expert by broadcast media including CTV, CBC, and Global affiliates.
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.