Creating a More Productive Developer Environment With Hysolate

Creating a More Productive Developer Environment With Hysolate

Organizations face multiple challenges when they try to secure their developers’ devices: Developers usually require unlimited access to the internet, in order to use various public resources like external code repositories and knowledge centers. Some of these websites might be malicious and pose a threat to the developer’s device, and ... Read More
The Connection Between GoldenSpy and MEDoc: Reducing the Security Risk of Doing Business

The Connection Between GoldenSpy and MEDoc: Reducing the Security Risk of Doing Business

|
Employees are often required to use various desktop applications to do business. In the work-from-home era, it’s very common to find remote collaboration and video conferencing apps, such as Zoom, Teams, Webex, being used on corporate devices. In today’s COVID-19 world, these applications are almost mandatory for efficient collaboration and ... Read More
How We Used the Latest Windows10 Technology to Build an Isolated Workspace-as-a-Service

How We Used the Latest Windows10 Technology to Build an Isolated Workspace-as-a-Service

|
Hysolate has been providing hyper-isolated environments to endpoint desktops for years. Using that knowledge and experience that we have gained, we recently released Isolated Workspace-as-a-Service (IWaaS), which brings some exciting and novel capabilities to the user’s desktop, leveraging state of the art virtualization and container technologies. In this post, we’ll ... Read More
Windows Containers 101

Windows Containers 101

| | Isolation
You’re probably familiar with the concept of containers – a piece of lightweight software that bundles an application and all its dependencies and configuration into a single package, that can be easily deployed and executed reliably and deterministically on multiple different platforms, environments, and operating systems. Containers have been very ... Read More
Windows Containers 101

Windows Containers 101

| | Isolation
You’re probably familiar with the concept of containers – a piece of lightweight software that bundles an application and all its dependencies and configuration into a single package, that can be easily deployed and executed reliably and deterministically on multiple different platforms, environments, and operating systems. Containers have been very ... Read More

Plugging Remote Desktop Security Holes

These days, almost everyone who can work remotely is doing so. Many remote workers use their corporate laptops from home. Others use their personal devices to connect to a corporate VDI (Virtual Desktop Infrastructure). And some leave their corporate devices at work and connect to them remotely from their personal ... Read More

System Hardening Guidelines for 2022: Critical Best Practices

Wouldn’t it be amazing if our laptops were as secure as Fort Knox? Where it’s so hard for bad actors to access your sensitive data, that they don’t even try?  While operating systems, like Microsoft Windows, have become more secure over time, they’re nowhere close to being impenetrable. That’s why ... Read More