The Workspace Isolation Blog

  • Is VDI Cost Effective vs Win10 Laptops?

    By Yan Aksenfeld. January 30, 2020

    Let’s stipulate up front that there are certain situations where Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) are viable and even a wise choice. That said, if you make the move to VDI with an expectation that the technology will save you money, it’s not going to end well. VDI costs can be significant and […]

  • Persistent vs Non Persistent VM: The Pros and Cons to Each

    By Yuki Arbel. January 28, 2020

    If you’re implementing virtual machines — whether directly on physical devices or through VDI sessions — you’re bound to face the perennial question of whether to use persistent or non-persistent VMs.  Before we get to the answer, let’s level-set on what we mean by persistent and non-persistent.  Persistent VMs means that each user’s virtual desktop […]

  • Implementing Privileged Access Workstations For Zero Trust Architecture

    By Tal Zamir. January 21, 2020

    The Problem with Zero Trust With more and more enterprises moving to mobile and cloud technologies, it’s becoming extremely difficult to enforce perimeter security. That’s why so many organizations are adopting Zero-Trust Architecture (ZTA). It enables them to grant access based on device/user credentials instead of a user’s presence in the corporate network. But as […]

  • Hysolate workstations NOT impacted by new Windows CryptoAPI Spoofing Vulnerability

    By Tal Zamir. January 16, 2020

    Summary Microsoft recently disclosed a spoofing vulnerability that enables an attacker to sign a malicious executable, making it appear that the file was from a trusted, legitimate source. It also enables attackers to conduct man-in-the-middle network attacks. In the recommended configuration of Hysolate, Hysolate customers are not impacted by this vulnerability due to Hysolate’s secure-by-design […]

  • New Insights into Privileged Access Management (PAM) Best Practices

    By Jessica Stanford. January 15, 2020

    The increasingly sophisticated and persistent nature of cyber threats underscores the importance of protecting your privileged accounts, along with their respective privileged users and privileged credentials. Privileged accounts, by their very nature, tend to be the sort of digital “crown jewels” that are much sought-after by hackers. Best practices for Privileged Access Management (PAM), the […]

  • How Virtual Air Gap Security Accelerates Digital Transformation

    By Tal Zamir. January 6, 2020

    In the first part of this blog series, we presented three endpoint challenges enterprises must overcome in their digital transformation journeys: threat prevention, user productivity, and user privacy. In this second blog, we show how a radical new approach called “virtual air gap,” or “software-defined endpoints,” improves cybersecurity by orders of magnitude, enables unrestricted user […]

  • The Best Attack Surface Reduction Method To Win The Endpoint Security Battle

    By Tal Zamir. January 5, 2020

    For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as a strategic position that provides a wide point of view with full visibility over the landscape. In medieval Europe, castles and fortresses included […]

  • Taking Zero Trust Network Access to The Next Level

    By Tal Zamir. December 30, 2019

    What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting mobile […]

  • Endpoints and Network Segmentation Best Practices

    By Yan Aksenfeld. December 23, 2019

    Network segmentation is a common and effective cybersecurity countermeasure. As attacks get more sophisticated, however, security tactics need to advance in parallel. For example, endpoints (laptops, desktops and workstations) are often considered among the “weakest links” in a cybersecurity strategy. They are thus the prime targets for network penetration attacks. That said, it’s apparent that […]