The Workspace Isolation Blog

  • Privileged Access Workstation Adoption: Infographic & Survey Data

    By Jessica Stanford. December 16, 2019

    This Privileged Access Workstation (PAW) Survey conducted by Cybersecurity Insiders revealed a lot about how organizations are approaching privileged access security. First – there seems to be a resounding agreement that Windows systems & IT admins need to use separate operating systems for sensitive and corporate activities. Nearly all respondents (94%) agree that IT admins […]

  • VDI Challenges: The Problem with VDI

    By Tal Zamir. December 15, 2019

    Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI) solutions (like VMware and Citrix). And why not? The promises made by VDI vendors have been compelling, if not always accurate: cost savings, enabling bring your own device (BYOD), improving the user experience and business continuity,  […]

  • VDI Security Best Practices: Breaking the Myth

    By Tal Zamir. December 14, 2019

    CISOs and security professionals often refer to Virtual Desktop Infrastructure (VDI) (made popular by VMWare & Citrix) and other “remote application” solutions as security barriers that hackers have a hard time bypassing. That’s a myth, and here’s why. 1. Thin client scenarios are precarious.  These virtualization efforts pose only a minor hurdle to determined cyber-criminals. […]

  • Living in a post-perimeter era

    By Tal Zamir. November 20, 2019

    Everybody’s talking about the post-perimeter era – an era in which there is no longer a distinction between being inside the perimeter of the organization or outside of it. In this new era, our personal devices mix access to sensitive, corporate and personal data. The conventional thinking is that because services and apps have moved […]

  • Does VDI protect against data leaks? 

    By Tal Zamir. November 9, 2019

    The short answer is simply no. Read more to find out why and to get some tips on how to fix things and get real security while keeping VDI in place (if you have to). In this post, when we use the term VDI, we refer to many different variants of remote desktops/apps, of any […]

  • Win10: 3 Perspectives on Endpoint Security Strategies

    By Tal Zamir. November 5, 2019

    Many businesses rely on corporate-owned Windows 10 devices for securing corporate endpoints. In an attempt to keep cyberattackers at bay, they may try to lock down Windows 10 with a variety of security features, such as Windows Defender (or a third-party EPP/EDR/NGAV solution), Credential Guard (to prevent pass-the-hash attacks), Device Guard (to enforce code signing […]

  • Virtual Air Gap Networks Explained: Air-Gapping A Virtual Machine

    By Tal Zamir. October 24, 2019

    Cyber attacks have become far too commonplace and sophisticated. So it’s not surprising that enterprise employees are continually and unwittingly exposing their devices – and their company’s crown jewels – to risk.  CISOs and IT leaders know they need a more effective way to block sensitive company information from cyber criminals. That’s why they’re turning […]

  • 3 Perspectives on Physical Air Gaps

    By Jessica Stanford. October 18, 2019

    A popular endpoint security strategy for users who have access to important data is to implement a physical air gap, also known as “Privileged Access Workstations” (PAW) or “Secure Access Workstations” (SAW).  With PAWs, each end user has a separate laptop or desktop that is dedicated solely to sensitive tasks and information. These devices are […]

  • Three Urgent User Challenges with Digital Transformation

    By Tal Zamir. October 11, 2019

    We all know that organizations going through the digital transformation revolution have to navigate significant technology, culture and workflow challenges. What’s becoming increasingly clear is that, as more of their business becomes digitized, they’re increasingly facing three major user-related challenges that can’t be ignored and require radical new approaches. In this first of a two-part […]