TheWorkspace Isolation Blog

Showing results for isolation

  • How to Safely Access Sensitive Data From Home – Part 2

    Our last blog provided an introduction to technologies controlling and protecting employee internet access in the modern enterprise. We also discussed the classic ways internet access is being protected. Make sure to catch up on it here if you have not already. This blog post will focus on cutting edge isolation technologies which ensure any … Continued

    Read More
  • How to Safely Access Sensitive Data From Home – Part 1

    In the new era of working-from-home learning to protect your sensitive data from the dangers of the internet is a challenge the majority of IT teams are facing today. You don’t have to be a cyber security expert to know that you need to be careful when accessing the internet in order to reduce cybersecurity … Continued

    Read More
  • Can container/docker benefits apply to client apps too?

    You’ve probably heard about containers before. In the unlikely case that you missed the hype, but here’s a quick recap: containers are bundles of applications and their dependencies. With containers, it’s possible to reliably/predictably/consistently run apps regardless of the underlying computing infrastructure they run on. Containers run in the same way everywhere and also isolate … Continued

    Read More
  • Windows Containers 101

    You’re probably familiar with the concept of containers – a piece of lightweight software that bundles an application and all its dependencies and configuration into a single package, that can be easily deployed and executed reliably and deterministically on multiple different platforms, environments, and operating systems. Containers have been very popular in recent years and … Continued

    Read More
  • Enforcing PCI DSS Compliance Requirements & OS Isolation

    The Role of the Dedicated OS in Enforcing PCI DSS Privileged Access Requirements   If your business handles credit cards, you know that malicious actors are gunning for the cardholder data your systems process. Perhaps no other digital asset is as frequently and intensely attacked as the data infrastructure that handles payment card information. For … Continued

    Read More
  • The Top 5 VDI Benefits (Hint: Security Isn’t One of Them)

    Virtual Desktop Infrastructure has been making waves since it hit the market way back in 2006. That’s when VMware coined the term VDI. The idea was to run a desktop operating system in a virtual machine located in a remote data center. End-users would connect to desktop images via thin clients or fat desktops. Applications … Continued

    Read More
  • Living in a post-perimeter era

    Everybody’s talking about the post-perimeter era – an era in which there is no longer a distinction between being inside the perimeter of the organization or outside of it. In this new era, our personal devices mix access to sensitive, corporate and personal data. The conventional thinking is that because services and apps have moved … Continued

    Read More
  • 3 Perspectives on Physical Air Gaps

    A popular endpoint security strategy for users who have access to important data is to implement a physical air gap, also known as “Privileged Access Workstations” (PAW) or “Secure Access Workstations” (SAW).  With PAWs, each end user has a separate laptop or desktop that is dedicated solely to sensitive tasks and information. These devices are … Continued

    Read More
  • The Hysolate Perspective: HP Acquires Bromium

    From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to sandbox specific applications, such as browsers and office apps. This acquisition marks another important milestone in the evolution of endpoint isolation technologies. It … Continued

    Read More
  • 3 Perspectives on Browser Isolation

    Isolation is an increasingly popular endpoint security strategy, and with good reason. It reduces risk by separating endpoint attack vectors from cyber criminals. Browser isolation is one of several isolation approaches. (Application, virtual and physical air gaps and virtual desktop infrastructure/VDI are others). Its concept is simple: move Internet activity away from a company’s local networks … Continued

    Read More
  • Network Isolation with Virtual Endpoints

    Network Isolation, the segmenting of a computer network into separate zones with distinct trust levels, for the purpose of containing hazards or reducing damage caused by a threat actor, is a hallmark of nearly every security-minded network design. Even though implementing port security policies, VLANs, VPNs, and other technologies can take many months of planning … Continued

    Read More
  • Protecting Against the Latest Windows DHCP Vulnerabilities

    Microsoft’s recent security patches, released on “Patch Tuesday,” reveal more vulnerabilities with Windows Dynamic Host Configuration Protocol (DHCP). Here’s what they imply and how Hysolate protects against them. Quick Summary: Of the 64 bugs squashed in Redmond’s March update, three caught our eyes: CVE-2019-0697, CVE-2019-0698, and CVE-2019-0726, all of which address holes in the DHCP … Continued

    Read More

Search by Tag