Endpoint Isolation: Can endpoints be hardened while keeping users productive?

Endpoint Isolation: Can endpoints be hardened while keeping users productive?

The Challenge   Enterprises, big and small, often need a high grade of endpoint security to comply with industry regulations, client requirements, or simply to prevent disruption to the business and protect ...

It’s Time to Unlock Workspaces and Unleash Productivity

| | user productivity
It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their ...

It’s Time to Unlock Workspaces and Unleash Productivity

| | user productivity
It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their ...
Is it time for Work 2.0 ?

Is it time for Work 2.0 ?

| | user productivity
If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to ...
Is it time for Work 2.0 ?

Is it time for Work 2.0 ?

| | user productivity
If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to ...

CISOs and the COVID-19 Challenge: Making WFH Frictionless and Secure

| | user productivity
A few weeks ago, Hysolate was honored to host a series of roundtables about COVID-19 challenges and implications at GDS Group’s Security Insight Summit. Can you guess what CISOs and IT execs ...

CISOs and the COVID-19 Challenge: Making WFH Frictionless and Secure

| | user productivity
A few weeks ago, Hysolate was honored to host a series of roundtables about COVID-19 challenges and implications at GDS Group’s Security Insight Summit. Can you guess what CISOs and IT execs ...

Living in a post-perimeter era

Everybody’s talking about the post-perimeter era – an era in which there is no longer a distinction between being inside the perimeter of the organization or outside of it. In this new ...

Finding the Balance with Windows Local Administrator Rights

As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows Operating System. Too much access on a file system is dangerous, while ...

Did Cyber Terror Win?

I hate airport security. The endless lines. Taking off your shoes. And your jacket. And your belt. Pulling all of your gadgets / laptops / tablets out of your bag, throwing away ...

Secure Guardrails