Robust Cloud Management

The Hysolate Workspace is fully managed from the cloud using a multi-tenant management console. The Hysolate Management Console allows administrators to provision new users and devices, design fine grained policies for individual users or whole teams, and monitor user and Workspace activity.

secure pc
  • Simple User Provisioning, Centralized Deployment and Upgrade

    Hysolate’s lightweight installer can be provisioned, deployed, and scaled to user endpoints in a matter of minutes, with granular policies set for each team. Hysolate is managed remotely from the cloud, via the Hysolate Management Console.

  • IdP integration (SSO)

    Hysolate integrates with your external identity provider - such as Azure AD and Okta. This lets endpoint users and admins sign-in to Hysolate using their corporate credentials. Admins can specify policy assignment rules that assign policies to users based on user attributes.

solution example
  • Granular policies

    Admins can define granular policies that control every aspect of Hysolate operation - including network access, transferring of content to and from the workspace, connecting external devices into the workspace, and many more.

solution example
  • Integrated application bundling

    Easily control which applications are installed on individual users’ Workspace as part of the policy. Package any application and make it available for deployment through a built-in app catalog.

  • Device and user monitoring

    The Hysolate Management Console dashboard is a single pane of glass for easy device monitoring and alerting, providing admins with peace of mind.

  • Admin and User auditing

    All admin activity is stored in an audit log. User activity on Workspace can be audited for security and forensic purposes.

solution example
  • SIEM Integration

    Activity logging from user endpoints that is sent to the HMC can be pushed directly to your company’s SIEM.

Why Hysolate?

Hysolate enables organizations to create trusted endpoints that are secure by design. 

With Hysolate you can isolate endpoint threats and secure enterprise access with an isolated virtual workspace that runs on the endpoint, and is fully managed from the cloud. 

This secure by design architecture splits the endpoint into two isolated workspaces, providing IT and Security management with peace of mind, without compromising user productivity.