The Workspace Isolation Blog

  • Enforcing PCI DSS Compliance Requirements & OS Isolation

    By karinerhysolate. February 18, 2020

    The Role of the Dedicated OS in Enforcing PCI DSS Privileged Access Requirements   If your business handles credit cards, you know that malicious actors are gunning for the cardholder data your systems process. Perhaps no other digital asset is as frequently and intensely attacked as the data infrastructure that handles payment card information. For […]

  • Pass-the-Hash Attack Mitigation: The Complete Guide

    By karinerhysolate. February 13, 2020

    The notorious “Pass-the-Hash” (PtH) attack is very much with us these days. If anything, it’s getting worse, as Advanced Persistent Threats (APTs) often use the technique to move laterally across networks in stealth mode. Virtual Machine (VM) isolation, as provided by Hysolate, offers an effective countermeasure. What is a “Pass-the-Hash” attack? To understand how a […]

  • Why Operating Systems Virtualization Is The Future of Security

    By Marc Gaffan. February 10, 2020

    Endpoint security is the holy grail for many enterprises and is also an oxymoron. No matter how many security tools you layer on, or how locked-down user devices are, determined cybercriminals can still ferret through the cracks. That’s why the best cybersecurity approach is to use virtualization technology to isolate operating systems that limits your […]

  • Sandboxing in Cyber Security: How Does It Fit In Your Stack?

    By karinerhysolate. February 6, 2020

    There’s no shortage of options when it comes to protecting corporate information from malware. A typical security stack includes everything from antivirus, firewalls, and data loss prevention (DLP), to network security and endpoint detection and response (EDR) tools. However, as we know all too well, while these tools provide some needed protection, they don’t stop […]

  • 3 Desktop as a Service (DaaS) Security Risks

    By Tal Zamir. February 4, 2020

    Desktop-as-a-Service (DaaS) has recently gained momentum with Microsoft making Windows Virtual Desktop (WVD) generally available and increasing its investment in this service. WVD basically lets companies host low-cost Windows desktops in the cloud, as an alternative to traditional on-prem VDI desktops. A major use case for DaaS is providing users access to Windows apps, like […]

  • Is VDI Cost Effective vs Win10 Laptops?

    By Yan Aksenfeld. January 30, 2020

    Let’s stipulate up front that there are certain situations where Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) are viable and even a wise choice. That said, if you make the move to VDI with an expectation that the technology will save you money, it’s not going to end well. VDI costs can be significant and […]

  • Persistent vs Non Persistent VM: The Pros and Cons to Each

    By Yuki Arbel. January 28, 2020

    If you’re implementing virtual machines — whether directly on physical devices or through VDI sessions — you’re bound to face the perennial question of whether to use persistent or non-persistent VMs.  Before we get to the answer, let’s level-set on what we mean by persistent and non-persistent.  Persistent VMs means that each user’s virtual desktop […]

  • Implementing Privileged Access Workstations For Zero Trust Architecture

    By Tal Zamir. January 21, 2020

    The Problem with Zero Trust With more and more enterprises moving to mobile and cloud technologies, it’s becoming extremely difficult to enforce perimeter security. That’s why so many organizations are adopting Zero-Trust Architecture (ZTA). It enables them to grant access based on device/user credentials instead of a user’s presence in the corporate network. But as […]

  • Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

    By Tal Zamir. January 16, 2020

    Summary Microsoft recently disclosed a spoofing vulnerability that enables an attacker to sign a malicious executable, making it appear that the file was from a trusted, legitimate source. It also enables attackers to conduct man-in-the-middle network attacks. In the recommended configuration of Hysolate, Hysolate customers are not impacted by this vulnerability due to Hysolate’s secure-by-design […]

  • New Insights into Privileged Access Management (PAM) Best Practices

    By karinerhysolate. January 15, 2020

    The increasingly sophisticated and persistent nature of cyber threats underscores the importance of protecting your privileged accounts, along with their respective privileged users and privileged credentials. Privileged accounts, by their very nature, tend to be the sort of digital “crown jewels” that are much sought-after by hackers. Best practices for Privileged Access Management (PAM), the […]