The Endpoint Isolation Blog

  • Remote Access Security: Risks & Best Practices

    By Yuki Arbel. April 16, 2020

    Remote access has helped businesses function for decades. It makes it possible for mobile and dispersed workforces, including employees, contractors, partners, and vendors, to access corporate IT systems and data from anywhere, anytime.  The rise of telework — 52% of global workers are said to work from home at least once a week — has […]

  • How to Become a World-Class CISO

    By Mariel Sable. April 7, 2020

    What does it take to become a Chief Information Security Officer (CISO)? There are multiple answers, because it’s a multi-faceted role. Each person will bring a unique set of experiences to the job and there’s no clear-cut path or resume that defines the steps you must take to become a CISO. Yet, there are some […]

  • Defending Active Directory Security Vulnerabilities

    By Yan Aksenfeld. March 17, 2020

    Active Directory Security Vulnerabilities: the role of PAWs in a Strong AD Defense Microsoft Active Directory (AD) provides directory services for organizations that use Windows Server. Based on the Lightweight Directory Access Protocol (LDAP), AD provides a range of directory functions, including centralized domain management and Identity and Access Management (IAM).  AD is more or […]

  • Working from the Home Front Securely

    By Tal Zamir. March 12, 2020

    It is said that home is where the heart is, but with the coronavirus (COVID-19) forcing a large part of the workforce to work from home to help contain its spread, home could be where the headache is. Increasingly, companies are employing work-from-home policies, with travel restrictions, quarantining, “social distancing” and other isolation techniques becoming […]

  • Experts Honor Hysolate with Top Awards in Privileged Access Protection and Cybersecurity Innovation

    By Jessica Stanford. March 10, 2020

      Cyberattackers overwhelmingly target privileged users so they can get access to privileged accounts which provide access to the company crown jewels. And all too often, they’re successful – when Hysolate isn’t deployed on those users’ devices. Our platform makes it virtually impossible for hackers to reach sensitive resources.  Our customers know this all too […]

  • Announcing: Hysolate + CyberArk Integration to Protect Privileged Users from Cyber Threats

    By Yuki Arbel. March 4, 2020

    Hysolate is excited to announce a new technical integration with CyberArk, the global leader in Privileged Access Management. Our customers leverage Hysolate’s modern secure workstation software platform to run multiple isolated operating systems on a single device with a unified and seamless user experience. In speaking with our customers, I have found that many of […]