The Workspace Isolation Blog

  • Securing Beats at Scale

    By Boris Figovsky. November 22, 2020

    At Hysolate we use Elastic to collect anonymous telemetry events. The Elastic stack is a great set of tools for centralized monitoring and log collection. However, the actual data shippers, called “Beats”, are not optimized for managing authentication at scale.  In this post, I will present how we overcame this issue with a modern – […]

  • Managing Your Security Product in the Cloud, Like a Spartan

    By Alon Kollmann. November 12, 2020

    The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though they were significantly outnumbered. Despite the fact king Leonidas did not know much about enterprise-grade security, there are multiple decisions that he had […]

  • Windows Virtual Desktop vs Citrix

    By Team Hysolate. November 4, 2020

    Let’s compare Windows Virtual Desktop vs Citrix Virtual Apps and Desktops across several key dimensions: system requirements, cost efficiency, accessibility for small to medium businesses, and administration experience required. System Requirements Windows Virtual Desktop To run WVD on Azure, you need to use a supported operating system (OS) and use the required license. Supported operating […]

  • How to Spin Up a Robust BYOD Security Strategy for your Growing Remote Workforce

    By Marc Gaffan. October 21, 2020

    Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited remote access to the corporate systems from their personal devices (BYODs). Following the COVID-19 outbreak though – offices around the globe were forced […]

  • How We Used the Latest Windows10 Technology to Build an Isolated Workspace-as-a-Service

    By Oleg Zlotnik. September 23, 2020

    Hysolate has been providing hyper-isolated environments to endpoint desktops for years. Using that knowledge and experience that we have gained, we recently released Isolated Workspace-as-a-Service (IWaaS), which brings some exciting and novel capabilities to the user’s desktop, leveraging state of the art virtualization and container technologies. In this post, we’ll try to get a deeper […]

  • Introducing Isolated Workspace-as-a-Service: The New Way to Isolate Your Workspace

    By Yuki Arbel. September 17, 2020

    We’re  excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can now browse the web, install software, or use USB devices and other hardware with no problem. IT no longer needs to compromise on […]

  • Extending Zero Trust to the Endpoint

    By Tal Zamir. September 1, 2020

    What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred to an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting […]

  • It’s Time to Unlock Workspaces and Unleash Productivity

    By Yuki Arbel. August 27, 2020

    It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their company experienced endpoint attacks that compromised data or IT infrastructure. Since COVID-19 hit, that number just keeps growing. May and June 2020 alone […]

  • How to Safely Access Sensitive Data From Home – Part 2

    By Yan Aksenfeld. August 24, 2020

    Our last blog provided an introduction to technologies controlling and protecting employee internet access in the modern enterprise. We also discussed the classic ways internet access is being protected. Make sure to catch up on it here if you have not already. This blog post will focus on cutting edge isolation technologies which ensure any […]

  • How to Safely Access Sensitive Data From Home – Part 1

    By Yan Aksenfeld. August 19, 2020

    In the new era of working-from-home learning to protect your sensitive data from the dangers of the internet is a challenge the majority of IT teams are facing today. You don’t have to be a cyber security expert to know that you need to be careful when accessing the internet in order to reduce cybersecurity […]