TheWorkspace Isolation Blog

Showing results for virtualization

  • VMware Horizon Architecture: Planning Your Deployment

    What is VMware Horizon? Virtual desktop infrastructure (VDI) products like VMware Horizon enable IT departments to run desktop applications and virtual machines in the data center or cloud, and deliver these desktop and remote applications to employees as managed services.  For administrators, this means simplified and automated desktop and application security management. Administrators can quickly … Continued

    Read More
  • Windows Virtual Desktop vs Citrix

    Let’s compare Windows Virtual Desktop vs Citrix Virtual Apps and Desktops across several key dimensions: system requirements, cost efficiency, accessibility for small to medium businesses, and administration experience required. System Requirements Windows Virtual Desktop To run WVD on Azure, you need to use a supported operating system (OS) and use the required license. Supported operating … Continued

    Read More
  • Introducing Isolated Workspace-as-a-Service

    We’re  excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can now browse the web, install software, or use USB devices and other hardware with no problem. IT no longer needs to compromise on … Continued

    Read More
  • Why Operating Systems Virtualization Is The Future of Security

    Endpoint security is the holy grail for many enterprises and is also an oxymoron. No matter how many security tools you layer on, or how locked-down user devices are, determined cybercriminals can still ferret through the cracks. That’s why the best cybersecurity approach is to use virtualization technology to isolate operating systems that limits your … Continued

    Read More
  • 3 Desktop as a Service (DaaS) Security Risks

    Desktop-as-a-Service (DaaS) has recently gained momentum with Microsoft making Windows Virtual Desktop (WVD) generally available and increasing its investment in this service. WVD basically lets companies host low-cost Windows desktops in the cloud, as an alternative to traditional on-prem VDI desktops. A major use case for DaaS is providing users access to Windows apps, like … Continued

    Read More
  • Persistent vs Non Persistent VM: The Pros and Cons to Each

    If you’re implementing virtual machines — whether directly on physical devices or through VDI sessions — you’re bound to face the perennial question of whether to use persistent or non-persistent VMs.  Before we get to the answer, let’s level-set on what we mean by persistent and non-persistent.  Persistent VMs means that each user’s virtual desktop … Continued

    Read More
  • The Best Attack Surface Reduction Method To Win The Endpoint Security Battle

    For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as a strategic position that provides a wide point of view with full visibility over the landscape. In medieval Europe, castles and fortresses included … Continued

    Read More
  • The Top 5 VDI Benefits (Hint: Security Isn’t One of Them)

    Virtual Desktop Infrastructure has been making waves since it hit the market way back in 2006. That’s when VMware coined the term VDI. The idea was to run a desktop operating system in a virtual machine located in a remote data center. End-users would connect to desktop images via thin clients or fat desktops. Applications … Continued

    Read More
  • VDI Challenges: The Problem with VDI

    Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI) solutions (like VMware and Citrix). And why not? The promises made by VDI vendors have been compelling, if not always accurate: cost savings, enabling bring your own device (BYOD), improving the user experience and business continuity,  … Continued

    Read More
  • The Hysolate Perspective: HP Acquires Bromium

    From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to sandbox specific applications, such as browsers and office apps. This acquisition marks another important milestone in the evolution of endpoint isolation technologies. It … Continued

    Read More
  • Network Isolation with Virtual Endpoints

    Network Isolation, the segmenting of a computer network into separate zones with distinct trust levels, for the purpose of containing hazards or reducing damage caused by a threat actor, is a hallmark of nearly every security-minded network design. Even though implementing port security policies, VLANs, VPNs, and other technologies can take many months of planning … Continued

    Read More