Hysolate Support for Windows 11

| | OS isolation, Windows 11
Microsoft rolled out their brand new version of Windows 11 on October 5th  to great fanfare. Windows 11 is free for current users of Windows 10, and can be downloaded here.  Microsoft calls the Windows 11 upgrade their biggest upgrade in years, with a focus on “productivity, creativity and ease,” ... Read More
Introducing Isolated Workspace-as-a-Service: The New Way to Isolate Your Workspace

Introducing Isolated Workspace-as-a-Service: The New Way to Isolate Your Workspace

We’re  excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever. With our isolated workspace solution, you can now browse the web, install software, or use USB devices and other hardware with no problem. IT no ... Read More

It’s Time to Unlock Workspaces and Unleash Productivity

| | user productivity
It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their company experienced endpoint attacks that compromised data or IT infrastructure. Since COVID-19 hit, that number just keeps growing ... Read More

It’s Time to Unlock Workspaces and Unleash Productivity

| | user productivity
It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their company experienced endpoint attacks that compromised data or IT infrastructure. Since COVID-19 hit, that number just keeps growing ... Read More

CISOs and the COVID-19 Challenge: Making WFH Frictionless and Secure

| | user productivity
A few weeks ago, Hysolate was honored to host a series of roundtables about COVID-19 challenges and implications at GDS Group’s Security Insight Summit. Can you guess what CISOs and IT execs said their biggest struggle has been? Enabling their workforces to effectively work from home.   For many companies, WFH ... Read More

CISOs and the COVID-19 Challenge: Making WFH Frictionless and Secure

| | user productivity
A few weeks ago, Hysolate was honored to host a series of roundtables about COVID-19 challenges and implications at GDS Group’s Security Insight Summit. Can you guess what CISOs and IT execs said their biggest struggle has been? Enabling their workforces to effectively work from home. For many companies, WFH ... Read More

Remote Access Security: Risks & Best Practices

Remote access has helped businesses function for decades. It makes it possible for mobile and dispersed workforces, including employees, contractors, partners, and vendors, to access corporate IT systems and data from anywhere, anytime. The rise of telework — 52% of global workers are said to work from home at least ... Read More

Announcing: Hysolate + CyberArk Integration to Protect Privileged Users from Cyber Threats

| | Endpoint security
Hysolate is excited to announce a new technical integration with CyberArk, the global leader in Privileged Access Management. Our customers leverage Hysolate’s modern secure workstation software platform to run multiple isolated operating systems on a single device with a unified and seamless user experience. In speaking with our customers, I ... Read More

How to Secure DevOps Environments: Exploring Best Practices

Hard to believe, but it’s been more than a decade since the concept of DevOps was introduced. By eliminating the silos separating software development and operations teams, and fostering a more agile, collaborative environment, DevOps promised to help organizations deliver better software faster. By using automation to manage many of ... Read More

Web Browser-Based Attacks: How to Protect Users

| | cyber security strategies
Browser attacks are one of the most popular ways for cyber criminals to inflict damage. This shouldn’t be surprising considering how exposed web browsers are and how much sensitive information they hold, such as credit card details, passwords, IDs, and more. By compromising web browsers like Google Chrome, Microsoft Internet ... Read More

Secure Guardrails