Perception Point and Hysolate Join Forces to Deliver Unbeatable Web Security

|
We started Hysolate a few years ago with the vision of creating secure-by-design endpoints that let users work productively, without risking their organizations.  What started off as an idea has now turned into a reality with our VM-based isolation technology: Hysolate instantly creates a local isolated zone on the endpoint ... Read More
Hysolate Free for Sensitive Access

Hysolate Free for Sensitive Access

| | hysolate free, sensitive access
Back in May 2021 we launched our first version of Hysolate Free, as a Free Forever sandbox for isolating risky activities. We were delighted with the large number of users who signed up and found the solution helpful, but we realized that something was missing. Hysolate Free was a great ... Read More
Why Traditional Security Solutions aren’t Stopping Ransomware

Why Traditional Security Solutions aren’t Stopping Ransomware

75% of companies that were hit by ransomware last year had up to date endpoint protection solutions in place. Why didn’t that help stop the attacks? Let’s take a look at the most common approaches to ransomware prevention, and why they haven’t been able to provide a solution for enterprises.  ... Read More
Security Teams: You Don’t Need to Frustrate Your Developers

Security Teams: You Don’t Need to Frustrate Your Developers

| | developer, OS islolation
It’s clear to security and technology managers that unsecured developer endpoints can lead to major problems.  A few years ago, there was a famous LinkedIn breach that all started with a hacker gaining access to a LinkedIn engineer’s endpoint. Unfortunately for LinkedIn, the engineer had a web server listening on ... Read More
Providing Access to Corporate Apps from Untrusted PCs:  What’s the Difference between Hysolate and Windows 365?

Providing Access to Corporate Apps from Untrusted PCs: What’s the Difference between Hysolate and Windows 365?

Microsoft recently announced Windows 365 – a dedicated cloud PC, available anywhere. At Hysolate, we’ve always been big advocates of cloud-delivered workspaces, and it’s exciting to see Microsoft embracing this concept, however, there are significant differences between Microsoft Windows 365 and Hysolate Workspace. This post will dive deep into both ... Read More
Designing Zero Trust Endpoints

Designing Zero Trust Endpoints

Zero Trust is becoming a standard approach to securing access to enterprise applications (both cloud and on-prem). With Zero Trust, access is granted based primarily on user authentication and risk level, and not on the user’s presence in the corporate network. Based on the user’s credentials, the enterprise can grant ... Read More
Introducing Hysolate Free – Access Anything, Securely

Introducing Hysolate Free – Access Anything, Securely

Even before COVID-19 shut down workplaces globally, there was already a growing trend in work from anywhere for white collar workers at large corporations. In 2020 this process was accelerated, but rather than being a temporary blip, analysts expect workers to continue remotely or with some form of hybrid work ... Read More
Endpoint Isolation: Can endpoints be hardened while keeping users productive?

Endpoint Isolation: Can endpoints be hardened while keeping users productive?

The Challenge   Enterprises, big and small, often need a high grade of endpoint security to comply with industry regulations, client requirements, or simply to prevent disruption to the business and protect internal sensitive information from falling into the wrong hands. However, to support the modern digital workforce, endpoint security ... Read More

Designing your company’s end-user computing setup? read this first

In the first part of this article, I tried to portray the ideal characteristics of a trusted computing environment for users in the post-COVID world: future end-user computing should strongly isolate corporate assets, allow enterprises to adopt modern apps, with a blazing-fast user experience, on any device, anywhere, all in a ... Read More

What the IT world needs now: fast access to any app, anywhere, securely!

I’m writing this article in the midst of the COVID-19 crisis, a year after we first left our offices and moved to remote work. While it has immediate implications on all of our lives – both physically and virtually – it also gives us a glimpse into the future of ... Read More
Loading...