-
How to Harden Endpoints While Keeping Users Productive
How can enterprises marry security & business productivity needs on endpoints? I will discuss different approaches including endpoint isolation. The Challenge Enterprises, big and small, often need a high grade of endpoint security to comply with industry regulations, client requirements, or simply to prevent disruption to the business and protect internal sensitive information from … Continued
Read More -
It’s Time to Unlock Workspaces and Unleash Productivity
It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their company experienced endpoint attacks that compromised data or IT infrastructure. Since COVID-19 hit, that number just keeps growing. May and June 2020 alone … Continued
Read More -
Is it time for Work 2.0 ?
If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to employees hasn’t significantly changed in the last decade. It still mainly consists of some mix of the following approaches: Corporate-owned PCs: providing a … Continued
Read More -
How CISOs can Make WFH Frictionless and Secure
A few weeks ago, Hysolate was honored to host a series of roundtables about COVID-19 challenges and implications at GDS Group’s Security Insight Summit. Can you guess what CISOs and IT execs said their biggest struggle has been? Enabling their workforces to effectively work from home. For many companies, WFH has meant a total 180 … Continued
Read More -
Living in a post-perimeter era
Everybody’s talking about the post-perimeter era – an era in which there is no longer a distinction between being inside the perimeter of the organization or outside of it. In this new era, our personal devices mix access to sensitive, corporate and personal data. The conventional thinking is that because services and apps have moved … Continued
Read More -
Finding the Balance with Windows Local Administrator Rights
As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows Operating System. Too much access on a file system is dangerous, while not enough causes subsequent tickets created at a help-desk. An equilibrium of supportability and security is ideal, yet seldom achieved. Windows Local Administrator … Continued
Read More -
Did Cyber Terror Win?
I hate airport security. The endless lines. Taking off your shoes. And your jacket. And your belt. Pulling all of your gadgets / laptops / tablets out of your bag, throwing away your toothpaste because it’s oversized, being scanned by mysterious scanners, being patted-down by strangers, answering security questions about your visit at 6AM after … Continued
Read More -
How to Stop Privileged Accounts From Being Compromised
In recent years, enterprises have started to become much more aware of the importance of IT hygiene for privileged accounts. With so many public cases of hackers gaining access to critical resources and causing insurmountable damage, it’s hard to escape the reality of today’s ever-increasing cyberattacks. One prominent example is the attack on the Ukrainian … Continued
Read More
TheWorkspace Isolation Blog
Showing results for user productivity
Search by Tag
- Azure Active Directory (1)
- Azure AD and Microsoft Intune Archives (1)
- BYOD (2)
- BYOPC (2)
- cisco duo (1)
- Citrix (1)
- conditional access (1)
- Cyber Security Strategies (25)
- cybersecurity (2)
- cybersecurity awards (2)
- cybersecurity best practices (17)
- DaaS (6)
- DaaS for developers (1)
- developer (1)
- development lifecycle (1)
- end user computing (1)
- endpoint hardening (1)
- endpoint isolation (1)
- endpoint protection solutions (1)
- endpoint protection stack (1)
- endpoint security (17)
- endpoint security innovation (1)
- enterprise vdi best practices (1)
- Hysolate awards (2)
- hysolate free (3)
- Infosec awards 2021 (1)
- Intune (1)
- isolate risky activities (1)
- Isolated desktop (1)
- isolated desktop as a service (1)
- isolated workspace (1)
- isolated workspace as a service (2)
- isolation (12)
- IT freedom (1)
- IT leadership (1)
- IT productivity (3)
- IT security (1)
- Microsoft ADD (1)
- miniservices vs microservices (1)
- one week sprints (1)
- operating systems (1)
- OS islolation (1)
- OS isolation (3)
- paw (10)
- phishing (1)
- ransomware (1)
- ransomware prevention (1)
- remote productivity (1)
- remote work (2)
- remote work financial sector (1)
- remote work productivity (1)
- scrum (1)
- secure access (1)
- secure access for enterprises (1)
- secure DaaS (2)
- secure open source (1)
- security guidelines for CISOs (1)
- security leadership (1)
- sensitive access (1)
- startup development (1)
- user productivity (8)
- vdi (7)
- vdi alternatives (2)
- vdi best practices (1)
- vdi costs (1)
- vdi vs daas (1)
- Virtual air gap (0)
- virtualization (11)
- what are windows containers (1)
- windows 10 sandbox (0)
- windows 11 (1)
- windows 365 (1)
- windows container intro (1)
- Windows isolation (1)
- Windows Sandbox (1)
- Windows Virtual Desktop (1)
- Zero Trust (1)
- Zero Trust for the Endpoint (1)