The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though they were significantly outnumbered. Despite the fact king Leonidas did not know much about enterprise-grade security, there are multiple decisions that he had […]
Let’s compare Windows Virtual Desktop vs Citrix Virtual Apps and Desktops across several key dimensions: system requirements, cost efficiency, accessibility for small to medium businesses, and administration experience required. System Requirements Windows Virtual Desktop To run WVD on Azure, you need to use a supported operating system (OS) and use the required license. Supported operating […]
Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited remote access to the corporate systems from their personal devices (BYODs). Following the COVID-19 outbreak though – offices around the globe were forced […]
We’re excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can now browse the web, install software, or use USB devices and other hardware with no problem. IT no longer needs to compromise on […]
COVID-19 has changed the way we operate in our daily lives, to say the least. Everything from school and shopping, to finances, family life, and work, were overturned seemingly overnight. As with many crises, most of the world began COVID-19 in a state of denial—”it’s not really happening; it won’t impact us.” This quickly moved […]
These days, almost everyone who can work remotely is doing so. Many remote workers use their corporate laptops from home. Others use their personal devices to connect to a corporate VDI (Virtual Desktop Infrastructure). And some leave their corporate devices at work and connect to them remotely from their personal devices, including phones and tablets. […]
Isolation is something we’re becoming all too familiar with these days. However isolation is not a new concept, especially in the cybersecurity world. Security professionals have been using isolation techniques to keep viruses at bay for years. The strategies have evolved over time, and today include virtual desktop infrastructure (VDI), app sandboxing, browser isolation, physical […]
It is said that home is where the heart is, but with the coronavirus (COVID-19) forcing a large part of the workforce to work from home to help contain its spread, home could be where the headache is. Increasingly, companies are employing work-from-home policies, with travel restrictions, quarantining, “social distancing” and other isolation techniques becoming […]
Cyberattackers overwhelmingly target privileged users so they can get access to privileged accounts which provide access to the company crown jewels. And all too often, they’re successful – when Hysolate isn’t deployed on those users’ devices. Our platform makes it virtually impossible for hackers to reach sensitive resources. Our customers know this all too […]
Hysolate is excited to announce a new technical integration with CyberArk, the global leader in Privileged Access Management. Our customers leverage Hysolate’s modern secure workstation software platform to run multiple isolated operating systems on a single device with a unified and seamless user experience. In speaking with our customers, I have found that many of […]