The Endpoint Isolation Blog

Showing results for user productivity

  • It’s Time to Unlock Workspaces and Unleash Productivity

    By Yuki Arbel. August 27, 2020

    It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their company experienced endpoint attacks that compromised data or IT infrastructure. Since COVID-19 hit, that number just keeps growing. May and June 2020 alone […]

  • Is it time for Work 2.0 ?

    By Tal Zamir. August 17, 2020

    If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to employees hasn’t significantly changed in the last decade. It still mainly consists of some mix of the following approaches: Corporate-owned PCs: providing a […]

  • Living in a post-perimeter era

    By Tal Zamir. November 20, 2019

    Everybody’s talking about the post-perimeter era – an era in which there is no longer a distinction between being inside the perimeter of the organization or outside of it. In this new era, our personal devices mix access to sensitive, corporate and personal data. The conventional thinking is that because services and apps have moved […]

  • Finding the Balance with Windows Local Administrator Rights

    By Mariel Sable. September 11, 2019

    As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows Operating System. Too much access on a file system is dangerous, while not enough causes subsequent tickets created at a help-desk. An equilibrium of supportability and security is ideal, yet seldom achieved. Windows Local Administrator […]

  • Did Cyber Terror Win?

    By Tal Zamir. July 10, 2019

    I hate airport security. The endless lines. Taking off your shoes. And your jacket. And your belt.  Pulling all of your gadgets / laptops / tablets out of your bag, throwing away your toothpaste because it’s oversized, being scanned by mysterious scanners, being patted-down by strangers, answering security questions about your visit at 6AM after […]

  • How to Stop Privileged Accounts From Being Compromised

    By Yuki Arbel. February 1, 2019

    In recent years, enterprises have started to become much more aware of the importance of IT hygiene for privileged accounts. With so many public cases of hackers gaining access to critical resources and causing insurmountable damage, it’s hard to escape the reality of today’s ever-increasing cyberattacks. One prominent example is the attack on the Ukrainian […]