The Endpoint Isolation Blog

Showing results for paw

  • Security Concerns with an At-Home Workforce

    By Josh Hogle. June 18, 2020

    Survey Results Indicate Major Security Concerns with an At-Home Workforce Hysolate recently polled industry leaders at the FS-ISAC Virtual Summit to get a better understanding of how organizations are addressing access to privileged environments today, and how comfortable they are with their current approaches, especially in the emphasized work-from-home paradigm we all find ourselves in. […]

  • Defending Active Directory Security Vulnerabilities

    By Yan Aksenfeld. March 17, 2020

    Active Directory Security Vulnerabilities: the role of PAWs in a Strong AD Defense Microsoft Active Directory (AD) provides directory services for organizations that use Windows Server. Based on the Lightweight Directory Access Protocol (LDAP), AD provides a range of directory functions, including centralized domain management and Identity and Access Management (IAM).  AD is more or […]

  • Privileged Access Workstation vs Jump Server

    By Jessica Stanford. February 27, 2020

    How does a privileged access workstation (PAW) compare to a jump server? Each provides a way for administrators to safely access secure, privileged network segments. However, how they fit into an organization and the most suitable use case for each differ. This post will examine pros and cons to both approaches. What is a Jump […]

  • Implementing Privileged Access Workstations For Zero Trust Architecture

    By Tal Zamir. January 21, 2020

    The Problem with Zero Trust With more and more enterprises moving to mobile and cloud technologies, it’s becoming extremely difficult to enforce perimeter security. That’s why so many organizations are adopting Zero-Trust Architecture (ZTA). It enables them to grant access based on device/user credentials instead of a user’s presence in the corporate network. But as […]

  • Taking Zero Trust Network Access to The Next Level

    By Tal Zamir. December 30, 2019

    What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting mobile […]

  • Privileged Access Workstation Adoption: Infographic & Survey Data

    By Jessica Stanford. December 16, 2019

    This Privileged Access Workstation (PAW) Survey conducted by Cybersecurity Insiders revealed a lot about how organizations are approaching privileged access security. First – there seems to be a resounding agreement that Windows systems & IT admins need to use separate operating systems for sensitive and corporate activities. Nearly all respondents (94%) agree that IT admins […]

  • 3 Perspectives on Physical Air Gaps

    By Jessica Stanford. October 18, 2019

    A popular endpoint security strategy for users who have access to important data is to implement a physical air gap, also known as “Privileged Access Workstations” (PAW) or “Secure Access Workstations” (SAW).  With PAWs, each end user has a separate laptop or desktop that is dedicated solely to sensitive tasks and information. These devices are […]

  • Three Urgent User Challenges with Digital Transformation

    By Tal Zamir. October 11, 2019

    We all know that organizations going through the digital transformation revolution have to navigate significant technology, culture and workflow challenges. What’s becoming increasingly clear is that, as more of their business becomes digitized, they’re increasingly facing three major user-related challenges that can’t be ignored and require radical new approaches. In this first of a two-part […]

  • How to Stop Privileged Accounts From Being Compromised

    By Yuki Arbel. February 1, 2019

    In recent years, enterprises have started to become much more aware of the importance of IT hygiene for privileged accounts. With so many public cases of hackers gaining access to critical resources and causing insurmountable damage, it’s hard to escape the reality of today’s ever-increasing cyberattacks. One prominent example is the attack on the Ukrainian […]