TheWorkspace Isolation Blog

Showing results for paw

  • Security Concerns with an At-Home Workforce

    Survey Results Indicate Major Security Concerns with an At-Home Workforce Hysolate recently polled industry leaders at the FS-ISAC Virtual Summit to get a better understanding of how organizations are addressing access to privileged environments today, and how comfortable they are with their current approaches, especially in the emphasized work-from-home paradigm we all find ourselves in. … Continued

    Read More
  • Defending Active Directory Security Vulnerabilities

    Active Directory Security Vulnerabilities: the role of PAWs in a Strong AD Defense Microsoft Active Directory (AD) provides directory services for organizations that use Windows Server. Based on the Lightweight Directory Access Protocol (LDAP), AD provides a range of directory functions, including centralized domain management and Identity and Access Management (IAM).  AD is more or … Continued

    Read More
  • Privileged Access Workstation vs Jump Server

    How does a privileged access workstation (PAW) compare to a jump server? Each provides a way for administrators to safely access secure, privileged network segments. However, how they fit into an organization and the most suitable use case for each differ. This post will examine pros and cons to both approaches. What is a Jump … Continued

    Read More
  • Privileged Access Workstations For Zero Trust Architecture

    The Problem with Zero Trust With more and more enterprises moving to mobile and cloud technologies, it’s becoming extremely difficult to enforce perimeter security. That’s why so many organizations are adopting Zero-Trust Architecture (ZTA). It enables them to grant access based on device/user credentials instead of a user’s presence in the corporate network. But as … Continued

    Read More
  • Taking Zero Trust Network Access to The Next Level

    What is Zero Trust? Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.  Initially, Zero trust referred an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting mobile … Continued

    Read More
  • The Top 5 VDI Benefits (Hint: Security Isn’t One of Them)

    Virtual Desktop Infrastructure has been making waves since it hit the market way back in 2006. That’s when VMware coined the term VDI. The idea was to run a desktop operating system in a virtual machine located in a remote data center. End-users would connect to desktop images via thin clients or fat desktops. Applications … Continued

    Read More
  • Privileged Access Workstation Adoption: Infographic & Survey Data

    This Privileged Access Workstation (PAW) Survey conducted by Cybersecurity Insiders revealed a lot about how organizations are approaching privileged access security. First – there seems to be a resounding agreement that Windows systems & IT admins need to use separate operating systems for sensitive and corporate activities. Nearly all respondents (94%) agree that IT admins … Continued

    Read More
  • 3 Perspectives on Physical Air Gaps

    A popular endpoint security strategy for users who have access to important data is to implement a physical air gap, also known as “Privileged Access Workstations” (PAW) or “Secure Access Workstations” (SAW).  With PAWs, each end user has a separate laptop or desktop that is dedicated solely to sensitive tasks and information. These devices are … Continued

    Read More
  • Three Urgent User Challenges with Digital Transformation

    We all know that organizations going through the digital transformation revolution have to navigate significant technology, culture and workflow challenges. What’s becoming increasingly clear is that, as more of their business becomes digitized, they’re increasingly facing three major user-related challenges that can’t be ignored and require radical new approaches. In this first of a two-part … Continued

    Read More
  • How to Stop Privileged Accounts From Being Compromised

    In recent years, enterprises have started to become much more aware of the importance of IT hygiene for privileged accounts. With so many public cases of hackers gaining access to critical resources and causing insurmountable damage, it’s hard to escape the reality of today’s ever-increasing cyberattacks. One prominent example is the attack on the Ukrainian … Continued

    Read More

Search by Tag