3 Desktop as a Service (DaaS) Security Risks

Desktop-as-a-Service (DaaS) has recently gained momentum with Microsoft making Windows Virtual Desktop (WVD) generally available and increasing its investment in this service. WVD basically lets companies host low-cost Windows desktops in the ...

Endpoints and Network Segmentation Best Practices

Network segmentation is a common and effective cybersecurity countermeasure. As attacks get more sophisticated, however, security tactics need to advance in parallel. For example, endpoints (laptops, desktops and workstations) are often considered ...

How Secure Are Air Gapped Computers

First, let’s talk about what a physical air gap is and why you’d implement one at all. What is an Air-Gapped Computer? An air gap by definition is a physical separation of ...
User Experience Demo

Have Your Cake and Eat It, Too: How Virtual Air Gap Solves Critical Digital Transformation Challenges

In the first part of this blog series, we presented three endpoint challenges enterprises must overcome in their digital transformation journeys: threat prevention, user productivity, and user privacy. In this second blog, ...
User Experience Demo

Virtual Air Gap: Explained

Cyber attacks have become far too commonplace and sophisticated. So it’s not surprising that enterprise employees are continually and unwittingly exposing their devices – and their company’s crown jewels – to risk ...

Secure Guardrails