User Experience Demo

Virtual Air Gap: Explained

Cyber attacks have become far too commonplace and sophisticated. So it’s not surprising that enterprise employees are continually and unwittingly exposing their devices – and their company’s crown jewels – to risk. CISOs and IT leaders know they need a more effective way to block sensitive company information from cyber ... Read More

Three Urgent User Challenges with Digital Transformation

We all know that organizations going through the digital transformation revolution have to navigate significant technology, culture and workflow challenges. What’s becoming increasingly clear is that, as more of their business becomes digitized, they’re increasingly facing three major user-related challenges that can’t be ignored and require radical new approaches. In ... Read More

Leveraging the Cyber “High Ground”: How to Win the Endpoint Battle

For over 2,000 years, people have leveraged elevated terrain, or “high ground,” to gain a strategic advantage over enemies and protect their realm. The Chinese “Art of War” suggests high ground as a strategic position that provides a wide point of view with full visibility over the landscape. In medieval ... Read More

The Hysolate Perspective: HP Acquires Bromium

From app sandboxing to OS isolation: How the endpoint is evolving Last week, HP announced that it has acquired Bromium, maker of an app sandboxing product that uses virtual machines (VMs) to sandbox specific applications, such as browsers and office apps. This acquisition marks another important milestone in the evolution ... Read More

How Hysolate Mitigates Windows 7 End-of-Life Issues

The end of the Windows 7 lifecycle is fast approaching: January 2020. This pending “end of life” means Microsoft will discontinue all support, including paid support, and all updates, including security updates. Of course, Microsoft might make an exception for some of its larger customers, but at a heavy price ... Read More

3 Perspectives on Browser Isolation

Isolation is an increasingly popular endpoint security strategy, and with good reason. It reduces risk by separating endpoint attack vectors from cyber criminals. Browser isolation is one of several isolation approaches. (Application, virtual and physical air gaps and virtual desktop infrastructure/VDI are others). Its concept is simple: move Internet activity ... Read More

Application Sandboxing: 3 Perspectives To Consider

Many IT organizations use app sandboxing in an attempt to safeguard sensitive information from cybercriminals. It’s a pretty straight-forward concept: contain threats coming from the sandboxed application to prevent them from affecting the operating system. Google Chrome and Apple Safari are simple examples of this technique in action. It’s kind ... Read More

Did Cyber Terror Win?

I hate airport security. The endless lines. Taking off your shoes. And your jacket. And your belt. Pulling all of your gadgets / laptops / tablets out of your bag, throwing away your toothpaste because it’s oversized, being scanned by mysterious scanners, being patted-down by strangers, answering security questions about ... Read More

The WhatsApp Hack

Could it be used to compromise your corporate environment? This week a vulnerability in the messaging app WhatsApp was reported that has allowed attackers to inject commercial spyware on to phones. WhatsApp, which is used by 1.5 billion people worldwide, discovered in early May that attackers were able to install ... Read More
Loading...