user productivity
Endpoint Isolation: Can endpoints be hardened while keeping users productive?
The Challenge Enterprises, big and small, often need a high grade of endpoint security to comply with industry regulations, client requirements, or simply to prevent disruption to the business and protect ...
It’s Time to Unlock Workspaces and Unleash Productivity
It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their ...
It’s Time to Unlock Workspaces and Unleash Productivity
It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their ...
Is it time for Work 2.0 ?
If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to ...
Is it time for Work 2.0 ?
If you’re reading this post, you’ve probably already heard about “unified endpoint management”, “enterprise mobility management”, the “digital workplace”, and other related buzzwords. However, the way we provide a work space to ...
CISOs and the COVID-19 Challenge: Making WFH Frictionless and Secure
A few weeks ago, Hysolate was honored to host a series of roundtables about COVID-19 challenges and implications at GDS Group’s Security Insight Summit. Can you guess what CISOs and IT execs ...
CISOs and the COVID-19 Challenge: Making WFH Frictionless and Secure
A few weeks ago, Hysolate was honored to host a series of roundtables about COVID-19 challenges and implications at GDS Group’s Security Insight Summit. Can you guess what CISOs and IT execs ...
Living in a post-perimeter era
Everybody’s talking about the post-perimeter era – an era in which there is no longer a distinction between being inside the perimeter of the organization or outside of it. In this new ...
Finding the Balance with Windows Local Administrator Rights
As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows Operating System. Too much access on a file system is dangerous, while ...
Did Cyber Terror Win?
I hate airport security. The endless lines. Taking off your shoes. And your jacket. And your belt. Pulling all of your gadgets / laptops / tablets out of your bag, throwing away ...