The Endpoint Isolation Blog

Showing results for Cyber Security Strategies

  • Sandboxing in Cyber Security: How Does It Fit In Your Stack?

    By Jessica Stanford. February 6, 2020

    There’s no shortage of options when it comes to protecting corporate information from malware. A typical security stack includes everything from antivirus, firewalls, and data loss prevention (DLP), to network security and endpoint detection and response (EDR) tools. However, as we know all too well, while these tools provide some needed protection, they don’t stop […]

  • The Best Attack Surface Reduction Method To Win The Endpoint Security Battle

    By Tal Zamir. January 5, 2020

    For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as a strategic position that provides a wide point of view with full visibility over the landscape. In medieval Europe, castles and fortresses included […]

  • Finding the Balance with Windows Local Administrator Rights

    By Sebouh Arakelian. September 11, 2019

    As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows Operating System. Too much access on a file system is dangerous, while not enough causes subsequent tickets created at a help-desk. An equilibrium of supportability and security is ideal, yet seldom achieved. Windows Local Administrator […]

  • How Hysolate Mitigates Windows 7 End-of-Life Issues

    By Tal Zamir. August 28, 2019

    The end of the Windows 7 lifecycle is fast approaching: January 2020. This pending “end of life” means Microsoft will discontinue all support, including paid support, and all updates, including security updates. Of course, Microsoft might make an exception for some of its larger customers, but at a heavy price.  What does this mean for […]

  • 3 Perspectives on Browser Isolation

    By Tal Zamir. August 20, 2019

    Isolation is an increasingly popular endpoint security strategy, and with good reason. It reduces risk by separating endpoint attack vectors from cyber criminals. Browser isolation is one of several isolation approaches. (Application, virtual and physical air gaps and virtual desktop infrastructure/VDI are others). Its concept is simple: move Internet activity away from a company’s local networks […]

  • EPP: 3 Perspectives on Endpoint Security Strategies

    By Jessica Stanford. July 23, 2019

    When considering endpoint security strategies, it’s incredibly common to have an endpoint protection platform (EPP) in place. Let’s face it – Anti-virus (AV) is the OG endpoint security solution. Over the years, these tools have evolved into next generation antivirus (NGAV) and endpoint detection and response (EDR). What that really means is that vendors have […]

  • CyberTech 2019 – Our Take

    By Jessica Stanford. February 8, 2019

    It’s been a week since Cybertech 2019, and while the event made headlines for some of its famous speakers, most notably Benjamin Netanyahu, it held great importance for Hysolate for many more reasons. Our co-founder and CEO, Tal Zamir, had the opportunity to speak on a panel with fellow Team 8 co-founders Ofer Israeli, Illusive, […]

  • Application Sandboxing: 3 Perspectives To Consider

    By Tal Zamir. January 14, 2019

    Many IT organizations use app sandboxing in an attempt to safeguard sensitive information from cybercriminals. It’s a pretty straight-forward concept: contain threats coming from the sandboxed application to prevent them from affecting the operating system. Google Chrome and Apple Safari are simple examples of this technique in action. It’s kind of like making sure your […]

  • Page 2 of 2
  • 1
  • 2