Become a partner

End device protection and selected technology to ensure it

Martin Polák - Consultant at HP Inc. and team leader for pre-sales technical support for the ECE&I region, Hewlett-Packard INC ·

Attacks on endpoints are increasingly frequent and sophisticated, so protection must begin even before the operating system starts. The talk showed how the HP Wolf Security approach layers defenses from firmware through threat isolation to recovery and trust in the supply chain.

When security starts before boot

Device firmware has high privileges, often outside the operating system’s purview, so digital signatures and firmware integrity are checked both before boot and at runtime. If an anomaly is detected, the system is rolled back to the last known good state and a record is created for later analysis and fulfilling reporting obligations. The goal is for the user to know the state the device is booting in and be able to trust it.

Physical attacks are also a risk, for example obtaining BitLocker keys from the TPM chip via so‑called sniffing. Devices can therefore have chassis intrusion sensors and policies that erase keys in the TPM when tampering is detected, or protect the communication bus. This leaves the attacker only the cumbersome option of brute‑forcing the encryption, which is practically ineffective.

Read more

Sign in to ITAPA Health & Care 2026

Martin Polák

FLEX-IT
A specialist in endpoint devices and related services, solutions, and technologies, including mass management and security, with over twenty years of experience. He is engaged in both the process aspects of this field and the implementation and technological aspects of deploying and using endpoints in corporate environments. He holds a degree in…

Recommendation speakers

Páčil sa ti článok? Zdieľaj ho a povedz o ňom aj ostatným