The Workspace Isolation Blog

  • The Hysolate Perspective: HP Acquires Bromium

    By Tal Zamir. September 25, 2019

    From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to sandbox specific applications, such as browsers and office apps. This acquisition marks another important milestone in the evolution of endpoint isolation technologies. It […]

  • Finding the Balance with Windows Local Administrator Rights

    By Mariel Sable. September 11, 2019

    As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows Operating System. Too much access on a file system is dangerous, while not enough causes subsequent tickets created at a help-desk. An equilibrium of supportability and security is ideal, yet seldom achieved. Windows Local Administrator […]

  • How Hysolate Mitigates Windows 7 End-of-Life Issues

    By Tal Zamir. August 28, 2019

    The end of the Windows 7 lifecycle is fast approaching: January 2020. This pending “end of life” means Microsoft will discontinue all support, including paid support, and all updates, including security updates. Of course, Microsoft might make an exception for some of its larger customers, but at a heavy price.  What does this mean for […]

  • 3 Perspectives on Browser Isolation

    By Tal Zamir. August 20, 2019

    Isolation is an increasingly popular endpoint security strategy, and with good reason. It reduces risk by separating endpoint attack vectors from cyber criminals. Browser isolation is one of several isolation approaches. (Application, virtual and physical air gaps and virtual desktop infrastructure/VDI are others). Its concept is simple: move Internet activity away from a company’s local networks […]

  • Why I Joined Hysolate

    By Marc Gaffan. July 30, 2019

    I’m excited to be starting a new journey as CEO of Hysolate. I first met Tal Zamir, Hysolate’s Founder, two and a half years ago when he was just getting started with Hysolate. He presented this grand vision of splitting up people’s laptops into multiple, totally isolated and virtualized operating systems but unifying them into […]

  • EPP: 3 Perspectives on Endpoint Security Strategies

    By Jessica Stanford. July 23, 2019

    When considering endpoint security strategies, it’s incredibly common to have an endpoint protection platform (EPP) in place. Let’s face it – Anti-virus (AV) is the OG endpoint security solution. Over the years, these tools have evolved into next generation antivirus (NGAV) and endpoint detection and response (EDR). What that really means is that vendors have […]

  • Did Cyber Terror Win?

    By Tal Zamir. July 10, 2019

    I hate airport security. The endless lines. Taking off your shoes. And your jacket. And your belt.  Pulling all of your gadgets / laptops / tablets out of your bag, throwing away your toothpaste because it’s oversized, being scanned by mysterious scanners, being patted-down by strangers, answering security questions about your visit at 6AM after […]

  • The WhatsApp Hack

    By Tal Zamir. May 16, 2019

    Could it be used to compromise your corporate environment? This week a vulnerability in the messaging app WhatsApp was reported that has allowed attackers to inject commercial spyware on to phones. WhatsApp, which is used by 1.5 billion people worldwide, discovered in early May that attackers were able to install surveillance software on to both […]