-
System Hardening Guidelines for 2022: Critical Best Practices
Wouldn’t it be amazing if our laptops were as secure as Fort Knox? Where it’s so hard for bad actors to access your sensitive data, that they don’t even try? While operating systems, like Microsoft Windows, have become more secure over time, they’re nowhere close to being impenetrable. That’s why enterprises need to be hyper-vigilant … Continued
Read More -
The Difference between Hysolate and Windows 365
Microsoft recently announced Windows 365 – a dedicated cloud PC, available anywhere. At Hysolate, we’ve always been big advocates of cloud-delivered workspaces, and it’s exciting to see Microsoft embracing this concept, however, there are significant differences between Microsoft Windows 365 and Hysolate Workspace. This post will dive deep into both Windows 365 and Hysolate to … Continued
Read More -
Designing Your Enterprise’s End-User Computing Setup
In the first part of this article, I tried to portray the ideal characteristics of a trusted computing environment for users in the post-COVID world: future end-user computing should strongly isolate corporate assets, allow enterprises to adopt modern apps, with a blazing-fast user experience, on any device, anywhere, all in a scalable cost-effective way. Most enterprises … Continued
Read More -
Making virtual desktops work with Azure AD and Intune
There has been a massive growth in demand for DaaS solutions due to COVID-19 and the sudden move to remote working, but there are still some major areas of improvement in the coverage of current solutions. One of the main gaps in VDI/DaaS solutions is native support for Azure AD and Intune for managing the … Continued
Read More -
Creating a More Productive Developer Environment With Hysolate
Organizations face multiple challenges when they try to secure their developers’ devices: Developers usually require unlimited access to the internet, in order to use various public resources like external code repositories and knowledge centers. Some of these websites might be malicious and pose a threat to the developer’s device, and to other linked company infrastructure … Continued
Read More -
Spin Up a BYOD Security Strategy for your Remote Workforce
Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited remote access to the corporate systems from their personal devices (BYODs). Following the COVID-19 outbreak though – offices around the globe were forced … Continued
Read More
TheWorkspace Isolation Blog
Showing results for DaaS
Search by Tag
- Azure Active Directory (1)
- Azure AD and Microsoft Intune Archives (1)
- BYOD (2)
- BYOPC (2)
- cisco duo (1)
- Citrix (1)
- conditional access (1)
- Cyber Security Strategies (25)
- cybersecurity (2)
- cybersecurity awards (2)
- cybersecurity best practices (17)
- DaaS (6)
- DaaS for developers (1)
- developer (1)
- development lifecycle (1)
- end user computing (1)
- endpoint hardening (1)
- endpoint isolation (1)
- endpoint protection solutions (1)
- endpoint protection stack (1)
- endpoint security (17)
- endpoint security innovation (1)
- enterprise vdi best practices (1)
- Hysolate awards (2)
- hysolate free (3)
- Infosec awards 2021 (1)
- Intune (1)
- isolate risky activities (1)
- Isolated desktop (1)
- isolated desktop as a service (1)
- isolated workspace (1)
- isolated workspace as a service (2)
- isolation (12)
- IT freedom (1)
- IT leadership (1)
- IT productivity (3)
- IT security (1)
- Microsoft ADD (1)
- miniservices vs microservices (1)
- one week sprints (1)
- operating systems (1)
- OS islolation (1)
- OS isolation (3)
- paw (10)
- phishing (1)
- ransomware (1)
- ransomware prevention (1)
- remote productivity (1)
- remote work (2)
- remote work financial sector (1)
- remote work productivity (1)
- scrum (1)
- secure access (1)
- secure access for enterprises (1)
- secure DaaS (2)
- secure open source (1)
- security guidelines for CISOs (1)
- security leadership (1)
- sensitive access (1)
- startup development (1)
- user productivity (8)
- vdi (7)
- vdi alternatives (2)
- vdi best practices (1)
- vdi costs (1)
- vdi vs daas (1)
- Virtual air gap (0)
- virtualization (11)
- what are windows containers (1)
- windows 10 sandbox (0)
- windows 11 (1)
- windows 365 (1)
- windows container intro (1)
- Windows isolation (1)
- Windows Sandbox (1)
- Windows Virtual Desktop (1)
- Zero Trust (1)
- Zero Trust for the Endpoint (1)