Extending Zero Trust to the Endpoint

secure pc
  • The Problem

    With Zero Trust architectures, enterprises no longer assume users within the network perimeter are trusted - instead they adopt a “Zero Trust” methodology in which all access to enterprise resources must be authenticated and verified before it is granted. However, these architectures often neglect to ensure that the endpoint’s security is secure at an adequate level. Using traditional endpoint security approaches keeps failing with attackers leveraging the endpoint as the weakest link in the Zero Trust model. As soon as an attacker breaches an endpoint, they can own the endpoint OS and operate on behalf of the user, once they are authenticated and granted access. Then, attackers can leverage this access to exfiltrate data, laterally move within the enterprise environment, and further deepen their incursion into the enterprise environment.

  • The Solution

    Hysolate complements Zero Trust security architectures by comprehensively securing the endpoint, by design. With Hysolate, access to sensitive enterprise apps on the endpoint can only be done from an isolated trusted OS while access to risky/potentially malicious apps is done on a completely separate OS. This is done by leveraging the latest virtualization-based security technologies and enhancing them so that enterprises can instantly split the endpoint into these two isolated operating systems, in a way that is user-friendly and cloud-managed. Using Hysolate, you can increase the level of trust with a high level of assurance that access is being performed from a secure OS.

solution example

Benefits

  • Full isolation of the two operating systems, including fine-grained security controls for clipboard data, networking, peripherals, keyboard, display, disk encryption, etc.

  • Leveraging “conditional access” features of the Zero Trust broker (e.g. Azure AD) that would only allow access only from the trusted OS.

  • Users can access any websites and applications that they need to do their jobs, from within the less restricted environment without risking corporate data and assets.

  • The user experience is native and local and doesn’t require any additional network hop for accessing the isolated OS, as it is running in a local VM.

  • Spinning up the Hysolate VM can be done in minutes, and doesn’t need costly infrastructure

  • The solution can be applied both to corporate-managed devices and to 3rd party devices.

workspace icon

Ready to protect your enterprise assets from endpoint risks?