The Endpoint Isolation Blog

Showing results for isolation

  • Enforcing PCI DSS Compliance Requirements & OS Isolation

    By Jessica Stanford. February 18, 2020

    The Role of the Dedicated OS in Enforcing PCI DSS Privileged Access Requirements   If your business handles credit cards, you know that malicious actors are gunning for the cardholder data your systems process. Perhaps no other digital asset is as frequently and intensely attacked as the data infrastructure that handles payment card information. For […]

  • Living in a post-perimeter era

    By Tal Zamir. November 20, 2019

    Everybody’s talking about the post-perimeter era – an era in which there is no longer a distinction between being inside the perimeter of the organization or outside of it. In this new era, our personal devices mix access to sensitive, corporate and personal data. The conventional thinking is that because services and apps have moved […]

  • 3 Perspectives on Physical Air Gaps

    By Jessica Stanford. October 18, 2019

    A popular endpoint security strategy for users who have access to important data is to implement a physical air gap, also known as “Privileged Access Workstations” (PAW) or “Secure Access Workstations” (SAW).  With PAWs, each end user has a separate laptop or desktop that is dedicated solely to sensitive tasks and information. These devices are […]

  • The Hysolate Perspective: HP Acquires Bromium

    By Tal Zamir. September 25, 2019

    From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to sandbox specific applications, such as browsers and office apps. This acquisition marks another important milestone in the evolution of endpoint isolation technologies. It […]

  • 3 Perspectives on Browser Isolation

    By Tal Zamir. August 20, 2019

    Isolation is an increasingly popular endpoint security strategy, and with good reason. It reduces risk by separating endpoint attack vectors from cyber criminals. Browser isolation is one of several isolation approaches. (Application, virtual and physical air gaps and virtual desktop infrastructure/VDI are others). Its concept is simple: move Internet activity away from a company’s local networks […]

  • Protecting Against the Latest Windows DHCP Vulnerabilities

    By Tal Zamir. March 19, 2019

    Microsoft’s recent security patches, released on “Patch Tuesday,” reveal more vulnerabilities with Windows Dynamic Host Configuration Protocol (DHCP). Here’s what they imply and how Hysolate protects against them. Quick Summary: Of the 64 bugs squashed in Redmond’s March update, three caught our eyes: CVE-2019-0697, CVE-2019-0698, and CVE-2019-0726, all of which address holes in the DHCP […]