The Workspace Isolation Blog

  • Introducing Isolated Workspace-as-a-Service: The New Way to Isolate Your Workspace

    By Yuki Arbel. September 17, 2020

    We’re  excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can now browse the web, install software, or use USB devices and other hardware with no problem. IT no longer needs to compromise on […]

  • Extending Zero Trust to the Endpoint

    By Tal Zamir. September 1, 2020

    What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred to an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting […]

  • It’s Time to Unlock Workspaces and Unleash Productivity

    By Yuki Arbel. August 27, 2020

    It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their company experienced endpoint attacks that compromised data or IT infrastructure. Since COVID-19 hit, that number just keeps growing. May and June 2020 alone […]

  • How to Safely Access Sensitive Data From Home – Part 2

    By Yan Aksenfeld. August 24, 2020

    Our last blog provided an introduction to technologies controlling and protecting employee internet access in the modern enterprise. We also discussed the classic ways internet access is being protected. Make sure to catch up on it here if you have not already. This blog post will focus on cutting edge isolation technologies which ensure any […]

  • How to Safely Access Sensitive Data From Home – Part 1

    By Yan Aksenfeld. August 19, 2020

    In the new era of working-from-home learning to protect your sensitive data from the dangers of the internet is a challenge the majority of IT teams are facing today. You don’t have to be a cyber security expert to know that you need to be careful when accessing the internet in order to reduce cybersecurity […]

  • Is it time for Work 2.0 ?

    By Tal Zamir. August 17, 2020

    If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to employees hasn’t significantly changed in the last decade. It still mainly consists of some mix of the following approaches: Corporate-owned PCs: providing a […]

  • Non-Persistent VMs with a Persistent User Experience – Make Your IT Admin’s Life Easier

    By Yan Aksenfeld. August 11, 2020

    Desktop virtualization solutions and use cases Desktop virtualization for end users in organizations is not a new concept. Since the 90’s, Citrix has been offering end users remote access to corporate software running in the datacenter. While managed virtual desktop infrastructure has provided a full desktop in the datacenter since the early 2000’s, and has […]

  • Can container/docker benefits apply to client apps too?

    By Tal Zamir. August 4, 2020

    You’ve probably heard about containers before. In the unlikely case that you missed the hype, but here’s a quick recap: containers are bundles of applications and their dependencies. With containers, it’s possible to reliably/predictably/consistently run apps regardless of the underlying computing infrastructure they run on. Containers run in the same way everywhere and also isolate […]

  • Windows Containers 101

    By Oleg Zlotnik. July 30, 2020

    You’re probably familiar with the concept of containers – a piece of lightweight software that bundles an application and all its dependencies and configuration into a single package, that can be easily deployed and executed reliably and deterministically on multiple different platforms, environments, and operating systems. Containers have been very popular in recent years and […]