The Endpoint Isolation Blog

  • Privileged Access Workstation vs Jump Server

    By Jessica Stanford. February 27, 2020

    How does a privileged access workstation (PAW) compare to a jump server? Each provides a way for administrators to safely access secure, privileged network segments. However, how they fit into an organization and the most suitable use case for each differ. This post will examine pros and cons to both approaches. What is a Jump […]

  • How to Secure DevOps Environments: Exploring Best Practices

    By Yuki Arbel. February 25, 2020

    Hard to believe, but it’s been more than a decade since the concept of DevOps was introduced. By eliminating the silos separating software development and operations teams, and fostering a more agile, collaborative environment, DevOps promised to help organizations deliver better software faster. By using automation to manage many of the tasks of building, testing, […]

  • Web Browser-Based Attacks: How to Protect Users

    By Yuki Arbel. February 20, 2020

    Browser attacks are one of the most popular ways for cyber criminals to inflict damage. This shouldn’t be surprising considering how exposed web browsers are and how much sensitive information they hold, such as credit card details, passwords, IDs, and more.  By compromising web browsers like Google Chrome, Microsoft Internet Explorer or Mozilla Firefox, hackers […]

  • Enforcing PCI DSS Compliance Requirements & OS Isolation

    By Jessica Stanford. February 18, 2020

    The Role of the Dedicated OS in Enforcing PCI DSS Privileged Access Requirements   If your business handles credit cards, you know that malicious actors are gunning for the cardholder data your systems process. Perhaps no other digital asset is as frequently and intensely attacked as the data infrastructure that handles payment card information. For […]

  • Pass-the-Hash Attack Mitigation: The Complete Guide

    By Jessica Stanford. February 13, 2020

    The notorious “Pass-the-Hash” (PtH) attack is very much with us these days. If anything, it’s getting worse, as Advanced Persistent Threats (APTs) often use the technique to move laterally across networks in stealth mode. Virtual Machine (VM) isolation, as provided by Hysolate, offers an effective countermeasure. What is a “Pass-the-Hash” attack? To understand how a […]

  • Why Operating Systems Virtualization Is The Future of Security

    By Marc Gaffan. February 10, 2020

    Endpoint security is the holy grail for many enterprises and is also an oxymoron. No matter how many security tools you layer on, or how locked-down user devices are, determined cybercriminals can still ferret through the cracks. That’s why the best cybersecurity approach is to use virtualization technology to isolate operating systems that limits your […]

  • Sandboxing in Cyber Security: How Does It Fit In Your Stack?

    By Jessica Stanford. February 6, 2020

    There’s no shortage of options when it comes to protecting corporate information from malware. A typical security stack includes everything from antivirus, firewalls, and data loss prevention (DLP), to network security and endpoint detection and response (EDR) tools. However, as we know all too well, while these tools provide some needed protection, they don’t stop […]

  • 3 Desktop as a Service (DaaS) Security Risks

    By Tal Zamir. February 4, 2020

    Desktop-as-a-Service (DaaS) has recently gained momentum with Microsoft making Windows Virtual Desktop (WVD) generally available and increasing its investment in this service. WVD basically lets companies host low-cost Windows desktops in the cloud, as an alternative to traditional on-prem VDI desktops. A major use case for DaaS is providing users access to Windows apps, like […]

  • Is VDI Cost Effective vs Win10 Laptops?

    By Yan Aksenfeld. January 30, 2020

    Let’s stipulate up front that there are certain situations where Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) are viable and even a wise choice. That said, if you make the move to VDI with an expectation that the technology will save you money, it’s not going to end well. VDI costs can be significant and […]