The Endpoint Isolation Blog

Showing results for endpoint security

  • Working from the Home Front Securely

    By Tal Zamir. March 12, 2020

    It is said that home is where the heart is, but with the coronavirus (COVID-19) forcing a large part of the workforce to work from home to help contain its spread, home could be where the headache is. Increasingly, companies are employing work-from-home policies, with travel restrictions, quarantining, “social distancing” and other isolation techniques becoming […]

  • Experts Honor Hysolate with Top Awards in Privileged Access Protection and Cybersecurity Innovation

    By Jessica Stanford. March 10, 2020

      Cyberattackers overwhelmingly target privileged users so they can get access to privileged accounts which provide access to the company crown jewels. And all too often, they’re successful – when Hysolate isn’t deployed on those users’ devices. Our platform makes it virtually impossible for hackers to reach sensitive resources.  Our customers know this all too […]

  • Announcing: Hysolate + CyberArk Integration to Protect Privileged Users from Cyber Threats

    By Yuki Arbel. March 4, 2020

    Hysolate is excited to announce a new technical integration with CyberArk, the global leader in Privileged Access Management. Our customers leverage Hysolate’s modern secure workstation software platform to run multiple isolated operating systems on a single device with a unified and seamless user experience. In speaking with our customers, I have found that many of […]

  • Is VDI Cost Effective vs Win10 Laptops?

    By Yan Aksenfeld. January 30, 2020

    Let’s stipulate up front that there are certain situations where Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) are viable and even a wise choice. That said, if you make the move to VDI with an expectation that the technology will save you money, it’s not going to end well. VDI costs can be significant and […]

  • Win10: 3 Perspectives on Endpoint Security Strategies

    By Tal Zamir. November 5, 2019

    Many businesses rely on corporate-owned Windows 10 devices for securing corporate endpoints. In an attempt to keep cyberattackers at bay, they may try to lock down Windows 10 with a variety of security features, such as Windows Defender (or a third-party EPP/EDR/NGAV solution), Credential Guard (to prevent pass-the-hash attacks), Device Guard (to enforce code signing […]

  • Three Urgent User Challenges with Digital Transformation

    By Tal Zamir. October 11, 2019

    We all know that organizations going through the digital transformation revolution have to navigate significant technology, culture and workflow challenges. What’s becoming increasingly clear is that, as more of their business becomes digitized, they’re increasingly facing three major user-related challenges that can’t be ignored and require radical new approaches. In this first of a two-part […]

  • Why I Joined Hysolate

    By Marc Gaffan. July 30, 2019

    I’m excited to be starting a new journey as CEO of Hysolate. I first met Tal Zamir, Hysolate’s Founder, two and a half years ago when he was just getting started with Hysolate. He presented this grand vision of splitting up people’s laptops into multiple, totally isolated and virtualized operating systems but unifying them into […]

  • Hysolate Expands U.S. Presence

    By Jessica Stanford. October 1, 2018

    We’re excited to announce that Hysolate is growing our U.S. operations! We brought on a seasoned cybersecurity marketer, Jessica Stanford, to run global marketing, and are actively hiring for additional US-based sales roles. This is response to the huge need we’re seeing from CIOs and CISOs for solutions that improve end-user productivity while securing endpoints.They’re […]