The Endpoint Isolation Blog

  • CyberTech 2019 – Our Take

    By Jessica Stanford. February 8, 2019

    It’s been a week since Cybertech 2019, and while the event made headlines for some of its famous speakers, most notably Benjamin Netanyahu, it held great importance for Hysolate for many more reasons. Our co-founder and CEO, Tal Zamir, had the opportunity to speak on a panel with fellow Team 8 co-founders Ofer Israeli, Illusive, […]

  • How to Stop Privileged Accounts From Being Compromised

    By Yuki Arbel. February 1, 2019

    In recent years, enterprises have started to become much more aware of the importance of IT hygiene for privileged accounts. With so many public cases of hackers gaining access to critical resources and causing insurmountable damage, it’s hard to escape the reality of today’s ever-increasing cyberattacks. One prominent example is the attack on the Ukrainian […]

  • Application Sandboxing: 3 Perspectives To Consider

    By Tal Zamir. January 14, 2019

    Many IT organizations use app sandboxing in an attempt to safeguard sensitive information from cybercriminals. It’s a pretty straight-forward concept: contain threats coming from the sandboxed application to prevent them from affecting the operating system. Google Chrome and Apple Safari are simple examples of this technique in action. It’s kind of like making sure your […]

  • Hysolate Expands U.S. Presence

    By Jessica Stanford. October 1, 2018

    We’re excited to announce that Hysolate is growing our U.S. operations! We brought on a seasoned cybersecurity marketer, Jessica Stanford, to run global marketing, and are actively hiring for additional US-based sales roles. This is response to the huge need we’re seeing from CIOs and CISOs for solutions that improve end-user productivity while securing endpoints.They’re […]