-
Protecting BYOPC corporate access using conditional access
The advent of the Bring your own PC (BYOPC) era This has got to be the most popular phrase in IT blogs in the past year, but yeah, we noticed – 2020 wasn’t a normal year, especially for the workplace. As we all know, we moved the workplace home and started connecting to our corporate … Continued
Read More -
Spin Up a BYOD Security Strategy for your Remote Workforce
Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited remote access to the corporate systems from their personal devices (BYODs). Following the COVID-19 outbreak though – offices around the globe were forced … Continued
Read More
TheWorkspace Isolation Blog
Showing results for BYOPC
Search by Tag
- Azure Active Directory (1)
- Azure AD and Microsoft Intune Archives (1)
- BYOD (2)
- BYOPC (2)
- cisco duo (1)
- Citrix (1)
- conditional access (1)
- Cyber Security Strategies (25)
- cybersecurity (2)
- cybersecurity awards (2)
- cybersecurity best practices (17)
- DaaS (6)
- DaaS for developers (1)
- developer (1)
- development lifecycle (1)
- end user computing (1)
- endpoint hardening (1)
- endpoint isolation (1)
- endpoint protection solutions (1)
- endpoint protection stack (1)
- endpoint security (17)
- endpoint security innovation (1)
- enterprise vdi best practices (1)
- Hysolate awards (2)
- hysolate free (3)
- Infosec awards 2021 (1)
- Intune (1)
- isolate risky activities (1)
- Isolated desktop (1)
- isolated desktop as a service (1)
- isolated workspace (1)
- isolated workspace as a service (2)
- isolation (12)
- IT freedom (1)
- IT leadership (1)
- IT productivity (3)
- IT security (1)
- Microsoft ADD (1)
- miniservices vs microservices (1)
- one week sprints (1)
- operating systems (1)
- OS islolation (1)
- OS isolation (3)
- paw (10)
- phishing (1)
- ransomware (1)
- ransomware prevention (1)
- remote productivity (1)
- remote work (2)
- remote work financial sector (1)
- remote work productivity (1)
- scrum (1)
- secure access (1)
- secure access for enterprises (1)
- secure DaaS (2)
- secure open source (1)
- security guidelines for CISOs (1)
- security leadership (1)
- sensitive access (1)
- startup development (1)
- user productivity (8)
- vdi (7)
- vdi alternatives (2)
- vdi best practices (1)
- vdi costs (1)
- vdi vs daas (1)
- Virtual air gap (0)
- virtualization (11)
- what are windows containers (1)
- windows 10 sandbox (0)
- windows 11 (1)
- windows 365 (1)
- windows container intro (1)
- Windows isolation (1)
- Windows Sandbox (1)
- Windows Virtual Desktop (1)
- Zero Trust (1)
- Zero Trust for the Endpoint (1)