The Endpoint Isolation Blog

  • Application Sandboxing: 3 Perspectives To Consider

    By Tal Zamir. January 14, 2019

    Many IT organizations use app sandboxing in an attempt to safeguard sensitive information from cybercriminals. It’s a pretty straight-forward concept: contain threats coming from the sandboxed application to prevent them from affecting the operating system. Google Chrome and Apple Safari are simple examples of this technique in action. It’s kind of like making sure your […]

  • Hysolate Expands U.S. Presence

    By Jessica Stanford. October 1, 2018

    We’re excited to announce that Hysolate is growing our U.S. operations! We brought on a seasoned cybersecurity marketer, Jessica Stanford, to run global marketing, and are actively hiring for additional US-based sales roles. This is response to the huge need we’re seeing from CIOs and CISOs for solutions that improve end-user productivity while securing endpoints.They’re […]