HP and Bromium isolate unsecure browser tabs

Technology aims to eliminate user error and other security holes

Internet Explorer

Drive-by downloads could become a thing of the past, as HP Inc partners with Bromium to isolate unsecure websites for users of its business-grade ultrabooks.

HP Sure Click is a new browser-based security technology that aims to neutralise the risk posed by users visiting unsecure websites. Every time the user visits a new website, Sure Click creates a new virtual machine (VM) to house that session. This isolates the activity within that tab, not only from the rest of the system, but from every other browser tab as well.

The tool is designed to thwart attack vectors such as phishing, malvertising, drive-by downloads and ransomware. HP is hoping that it will cut down on user error toos, frequently cited as one of the biggest security risk factors.

"With 81% of IT security managers citing unsecure web browsers as a primary attack vector, organisations are challenged to protect themselves against this ever-evolving threat," said HP's Alex Cho, vice president and general manager of commercial PCs and personal systems.

Advertisement - Article continues below

"By partnering with Bromium to create HP Sure Click, we provide exclusive hardware-enforced security for web browsers as a standard feature, giving both users and businesses the freedom to browse confidently."

HP Sure Click is compatible with Internet Explorer and Chromium, the open source variant of Google's popular Chrome browser. The feature will be included as standard in the HP EliteBook x360 1030 G2, which launches later this spring.

"HP's philosophy and approach to security is a natural fit with our own mission to stop cybercrime and keep the Internet safe for everyone," explains Ian Pratt, co-founder and president, Bromium.

"We are thrilled about our strategic relationship, and we're excited to have Bromium's virtualisation-based security used as a platform for HP Sure Click to deliver secure browsing built into HP's world-class devices."

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now



How can you protect your business from crypto-ransomware?

4 Nov 2019

Best ransomware removal tools

7 Dec 2018

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Business strategy

Huawei takes the US trade sanctions into its own hands

3 Dec 2019
cyber security

Millions of text messages leaked through exposed TrueDialog server

2 Dec 2019