TheWorkspace Isolation Blog

Showing results for endpoint security

  • How to Harden Endpoints While Keeping Users Productive

    How can enterprises marry security & business productivity needs on endpoints? I will discuss different approaches including endpoint isolation. The Challenge   Enterprises, big and small, often need a high grade of endpoint security to comply with industry regulations, client requirements, or simply to prevent disruption to the business and protect internal sensitive information from … Continued

    Read More
  • Managing Your Security Product in the Cloud, Like a Spartan

    The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors – who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though they were significantly outnumbered. Despite the fact king Leonidas did not know much about enterprise-grade security, there are multiple decisions that he had … Continued

    Read More
  • Windows Virtual Desktop vs Citrix

    Let’s compare Windows Virtual Desktop vs Citrix Virtual Apps and Desktops across several key dimensions: system requirements, cost efficiency, accessibility for small to medium businesses, and administration experience required. System Requirements Windows Virtual Desktop To run WVD on Azure, you need to use a supported operating system (OS) and use the required license. Supported operating … Continued

    Read More
  • Spin Up a BYOD Security Strategy for your Remote Workforce

    Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited remote access to the corporate systems from their personal devices (BYODs). Following the COVID-19 outbreak though – offices around the globe were forced … Continued

    Read More
  • Introducing Isolated Workspace-as-a-Service

    We’re  excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can now browse the web, install software, or use USB devices and other hardware with no problem. IT no longer needs to compromise on … Continued

    Read More
  • How WFH is Changing Endpoint Security

    COVID-19 has changed the way we operate in our daily lives, to say the least. Everything from school and shopping, to finances, family life, and work, were overturned seemingly overnight. As with many crises, most of the world began COVID-19 in a state of denial—”it’s not really happening; it won’t impact us.” This quickly moved … Continued

    Read More
  • Plugging Remote Desktop Security Holes

    These days, almost everyone who can work remotely is doing so. Many remote workers use their corporate laptops from home. Others use their personal devices to connect to a corporate VDI (Virtual Desktop Infrastructure). And some leave their corporate devices at work and connect to them remotely from their personal devices, including phones and tablets. … Continued

    Read More
  • What Attackers Think About Your Cybersecurity Isolation Strategy

    Isolation is something we’re becoming all too familiar with these days. However isolation is not a new concept, especially in the cybersecurity world. Security professionals have been using isolation techniques to keep viruses at bay for years. The strategies have evolved over time, and today include virtual desktop infrastructure (VDI), app sandboxing, browser isolation, physical … Continued

    Read More
  • Working from the Home Front Securely

    It is said that home is where the heart is, but with the coronavirus (COVID-19) forcing a large part of the workforce to work from home to help contain its spread, home could be where the headache is. Increasingly, companies are employing work-from-home policies, with travel restrictions, quarantining, “social distancing” and other isolation techniques becoming … Continued

    Read More
  • Hysolate Wins Awards in Privileged Access Protection

      Cyberattackers overwhelmingly target privileged users so they can get access to privileged accounts which provide access to the company crown jewels. And all too often, they’re successful – when Hysolate isn’t deployed on those users’ devices. Our platform makes it virtually impossible for hackers to reach sensitive resources.  Our customers know this all too … Continued

    Read More
  • Hysolate + CyberArk Integration to Protect Privileged Users

    Hysolate is excited to announce a new technical integration with CyberArk, the global leader in Privileged Access Management. Our customers leverage Hysolate’s modern secure workstation software platform to run multiple isolated operating systems on a single device with a unified and seamless user experience. In speaking with our customers, I have found that many of … Continued

    Read More
  • Is VDI Cost Effective vs Win10 Laptops?

    Let’s stipulate up front that there are certain situations where Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) are viable and even a wise choice. That said, if you make the move to VDI with an expectation that the technology will save you money, it’s not going to end well. VDI costs can be significant and … Continued

    Read More
  • Win10: 3 Perspectives on Endpoint Security Strategies

    Many businesses rely on corporate-owned Windows 10 devices for securing corporate endpoints. In an attempt to keep cyberattackers at bay, they may try to lock down Windows 10 with a variety of security features, such as Windows Defender (or a third-party EPP/EDR/NGAV solution), Credential Guard (to prevent pass-the-hash attacks), Device Guard (to enforce code signing … Continued

    Read More
  • Three Urgent User Challenges with Digital Transformation

    We all know that organizations going through the digital transformation revolution have to navigate significant technology, culture and workflow challenges. What’s becoming increasingly clear is that, as more of their business becomes digitized, they’re increasingly facing three major user-related challenges that can’t be ignored and require radical new approaches. In this first of a two-part … Continued

    Read More
  • Why I Joined Hysolate

    I’m excited to be starting a new journey as CEO of Hysolate. I first met Tal Zamir, Hysolate’s Founder, two and a half years ago when he was just getting started with Hysolate. He presented this grand vision of splitting up people’s laptops into multiple, totally isolated and virtualized operating systems but unifying them into … Continued

    Read More
  • Hysolate Expands U.S. Presence

    We’re excited to announce that Hysolate is growing our U.S. operations! We brought on a seasoned cybersecurity marketer, Jessica Stanford, to run global marketing, and are actively hiring for additional US-based sales roles. This is response to the huge need we’re seeing from CIOs and CISOs for solutions that improve end-user productivity while securing endpoints.They’re … Continued

    Read More