The Endpoint Isolation Blog

Showing results for endpoint security

  • Introducing Isolated Workspace-as-a-Service: The New Way to Isolate Your Workspace

    By Yuki Arbel. September 17, 2020

    We’re  excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can now browse the web, install software, or use USB devices and other hardware with no problem. IT no longer needs to compromise on […]

  • Why Operating Systems Virtualization Is The Future of Security

    By Marc Gaffan. February 10, 2020

    Endpoint security is the holy grail for many enterprises and is also an oxymoron. No matter how many security tools you layer on, or how locked-down user devices are, determined cybercriminals can still ferret through the cracks. That’s why the best cybersecurity approach is to use virtualization technology to isolate operating systems that limits your […]

  • 3 Desktop as a Service (DaaS) Security Risks

    By Tal Zamir. February 4, 2020

    Desktop-as-a-Service (DaaS) has recently gained momentum with Microsoft making Windows Virtual Desktop (WVD) generally available and increasing its investment in this service. WVD basically lets companies host low-cost Windows desktops in the cloud, as an alternative to traditional on-prem VDI desktops. A major use case for DaaS is providing users access to Windows apps, like […]

  • Persistent vs Non Persistent VM: The Pros and Cons to Each

    By Yuki Arbel. January 28, 2020

    If you’re implementing virtual machines — whether directly on physical devices or through VDI sessions — you’re bound to face the perennial question of whether to use persistent or non-persistent VMs.  Before we get to the answer, let’s level-set on what we mean by persistent and non-persistent.  Persistent VMs means that each user’s virtual desktop […]

  • The Best Attack Surface Reduction Method To Win The Endpoint Security Battle

    By Tal Zamir. January 5, 2020

    For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as a strategic position that provides a wide point of view with full visibility over the landscape. In medieval Europe, castles and fortresses included […]

  • VDI Challenges: The Problem with VDI

    By Tal Zamir. December 15, 2019

    Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI) solutions (like VMware and Citrix). And why not? The promises made by VDI vendors have been compelling, if not always accurate: cost savings, enabling bring your own device (BYOD), improving the user experience and business continuity,  […]

  • The Hysolate Perspective: HP Acquires Bromium

    By Tal Zamir. September 25, 2019

    From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to sandbox specific applications, such as browsers and office apps. This acquisition marks another important milestone in the evolution of endpoint isolation technologies. It […]