The Endpoint Isolation Blog

Showing results for cybersecurity

  • VMware Horizon Architecture: Planning Your Deployment

    By Team Hysolate. December 1, 2020

    What is VMware Horizon? Virtual desktop infrastructure (VDI) products like VMware Horizon enable IT departments to run desktop applications and virtual machines in the data center or cloud, and deliver these desktop and remote applications to employees as managed services.  For administrators, this means simplified and automated desktop and application security management. Administrators can quickly […]

  • Windows Virtual Desktop vs Citrix

    By Team Hysolate. November 4, 2020

    Let’s compare Windows Virtual Desktop vs Citrix Virtual Apps and Desktops across several key dimensions: system requirements, cost efficiency, accessibility for small to medium businesses, and administration experience required. System Requirements Windows Virtual Desktop To run WVD on Azure, you need to use a supported operating system (OS) and use the required license. Supported operating […]

  • Introducing Isolated Workspace-as-a-Service: The New Way to Isolate Your Workspace

    By Yuki Arbel. September 17, 2020

    We’re  excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can now browse the web, install software, or use USB devices and other hardware with no problem. IT no longer needs to compromise on […]

  • Why Operating Systems Virtualization Is The Future of Security

    By Marc Gaffan. February 10, 2020

    Endpoint security is the holy grail for many enterprises and is also an oxymoron. No matter how many security tools you layer on, or how locked-down user devices are, determined cybercriminals can still ferret through the cracks. That’s why the best cybersecurity approach is to use virtualization technology to isolate operating systems that limits your […]

  • 3 Desktop as a Service (DaaS) Security Risks

    By Tal Zamir. February 4, 2020

    Desktop-as-a-Service (DaaS) has recently gained momentum with Microsoft making Windows Virtual Desktop (WVD) generally available and increasing its investment in this service. WVD basically lets companies host low-cost Windows desktops in the cloud, as an alternative to traditional on-prem VDI desktops. A major use case for DaaS is providing users access to Windows apps, like […]

  • Persistent vs Non Persistent VM: The Pros and Cons to Each

    By Yuki Arbel. January 28, 2020

    If you’re implementing virtual machines — whether directly on physical devices or through VDI sessions — you’re bound to face the perennial question of whether to use persistent or non-persistent VMs.  Before we get to the answer, let’s level-set on what we mean by persistent and non-persistent.  Persistent VMs means that each user’s virtual desktop […]

  • The Best Attack Surface Reduction Method To Win The Endpoint Security Battle

    By Tal Zamir. January 5, 2020

    For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as a strategic position that provides a wide point of view with full visibility over the landscape. In medieval Europe, castles and fortresses included […]

  • VDI Challenges: The Problem with VDI

    By Tal Zamir. December 15, 2019

    Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI) solutions (like VMware and Citrix). And why not? The promises made by VDI vendors have been compelling, if not always accurate: cost savings, enabling bring your own device (BYOD), improving the user experience and business continuity,  […]

  • The Hysolate Perspective: HP Acquires Bromium

    By Tal Zamir. September 25, 2019

    From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to sandbox specific applications, such as browsers and office apps. This acquisition marks another important milestone in the evolution of endpoint isolation technologies. It […]

  • Page 1 of 2
  • 1
  • 2