The Endpoint Isolation Blog

Showing results for isolation

  • How to Safely Access Sensitive Data From Home – Part 2

    By Yan Aksenfeld. August 24, 2020

    Our last blog provided an introduction to technologies controlling and protecting employee internet access in the modern enterprise. We also discussed the classic ways internet access is being protected. Make sure to catch up on it here if you have not already. This blog post will focus on cutting edge isolation technologies which ensure any […]

  • How to Safely Access Sensitive Data From Home – Part 1

    By Yan Aksenfeld. August 19, 2020

    In the new era of working-from-home learning to protect your sensitive data from the dangers of the internet is a challenge the majority of IT teams are facing today. You don’t have to be a cyber security expert to know that you need to be careful when accessing the internet in order to reduce cybersecurity […]

  • Can container/docker benefits apply to client apps too?

    By Tal Zamir. August 4, 2020

    You’ve probably heard about containers before. In the unlikely case that you missed the hype, but here’s a quick recap: containers are bundles of applications and their dependencies. With containers, it’s possible to reliably/predictably/consistently run apps regardless of the underlying computing infrastructure they run on. Containers run in the same way everywhere and also isolate […]

  • Windows Containers 101

    By Oleg Zlotnik. July 30, 2020

    You’re probably familiar with the concept of containers – a piece of lightweight software that bundles an application and all its dependencies and configuration into a single package, that can be easily deployed and executed reliably and deterministically on multiple different platforms, environments, and operating systems. Containers have been very popular in recent years and […]

  • Enforcing PCI DSS Compliance Requirements & OS Isolation

    By karinerhysolate. February 18, 2020

    The Role of the Dedicated OS in Enforcing PCI DSS Privileged Access Requirements   If your business handles credit cards, you know that malicious actors are gunning for the cardholder data your systems process. Perhaps no other digital asset is as frequently and intensely attacked as the data infrastructure that handles payment card information. For […]

  • Living in a post-perimeter era

    By Tal Zamir. November 20, 2019

    Everybody’s talking about the post-perimeter era – an era in which there is no longer a distinction between being inside the perimeter of the organization or outside of it. In this new era, our personal devices mix access to sensitive, corporate and personal data. The conventional thinking is that because services and apps have moved […]

  • 3 Perspectives on Physical Air Gaps

    By karinerhysolate. October 18, 2019

    A popular endpoint security strategy for users who have access to important data is to implement a physical air gap, also known as “Privileged Access Workstations” (PAW) or “Secure Access Workstations” (SAW).  With PAWs, each end user has a separate laptop or desktop that is dedicated solely to sensitive tasks and information. These devices are […]

  • The Hysolate Perspective: HP Acquires Bromium

    By Tal Zamir. September 25, 2019

    From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to sandbox specific applications, such as browsers and office apps. This acquisition marks another important milestone in the evolution of endpoint isolation technologies. It […]

  • 3 Perspectives on Browser Isolation

    By Tal Zamir. August 20, 2019

    Isolation is an increasingly popular endpoint security strategy, and with good reason. It reduces risk by separating endpoint attack vectors from cyber criminals. Browser isolation is one of several isolation approaches. (Application, virtual and physical air gaps and virtual desktop infrastructure/VDI are others). Its concept is simple: move Internet activity away from a company’s local networks […]

  • Page 1 of 2
  • 1
  • 2