Virtual desktop infrastructure (VDI) products like VMware Horizon enable IT departments to run desktop applications and virtual machines in the data center or cloud, and deliver these desktop and remote applications to employees as managed services.
For administrators, this means simplified and automated desktop and application security management. Administrators can quickly create virtual desktops based on a required location and user profile, and securely manage desktops as services from a single control plane. VMware Horizon supports local, hybrid (local but managed in the cloud) and multi-cloud deployment strategies.
End users can access custom virtual desktops or remote RDSH applications from…
At Hysolate we use to collect anonymous telemetry events. The Elastic stack is a great set of tools for centralized monitoring and log collection. However, the actual data shippers, called “ “, are not optimized for managing authentication at scale.
In this post, I will present how we overcame this issue with a modern — and very clever — security and authentication mechanism.
Hysolate sends anonymous telemetry events to its cloud infrastructure to show our customers their usage information and to let them audit corporate access. …
The famous movie “300” tells the story of king Leonidas and his 300 Spartan warriors — who withstood a monumental attack by the Persian empire during the battle of Thermopylae, even though they were significantly outnumbered. Despite the fact king Leonidas did not know much about enterprise-grade security, there are multiple decisions that he had made as a leader that would have made him a spectacular CISO, which avoids the “on-premise” battlefield in favor of the cloud.
When we first started brainstorming on the next-gen architecture concepts of Hysolate, one of the key building blocks was already clear to us…
Let’s compare Windows Virtual Desktop vs Citrix Virtual Apps and Desktops across several key dimensions: system requirements, cost efficiency, accessibility for small to medium businesses, and administration experience required.
Windows Virtual Desktop
To run WVD on Azure, you need to use a supported operating system (OS) and use the required license. Supported operating systems for WVD on Azure are either Windows 10 Enterprise multi-session, Windows 10 Enterprise, or Windows 7 Enterprise. These operating systems should be accompanied by an appropriate licence.
An Office 365 licence includes plans for Enterprise 3, Enterprise 5, Academic 3, Academic 5, Firstline Workers 3, or…
Oleg Zlotnik, Senior Software Engineer, Hysolate
Hysolate has been providing hyper-isolated environments to endpoint desktops for years. Using that knowledge and experience that we have gained, we recently released Isolated Workspace-as-a-Service (IWaaS), which brings some exciting and novel capabilities to the user’s desktop, leveraging state of the art virtualization and container technologies. In this post, we’ll try to get a deeper look at the technological breakthroughs that allowed us to build IWaaS. But before diving in, let’s have a short recap of what IWaaS is.
Marc Gaffan, CEO, Hysolate
Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited remote access to the corporate systems from their personal devices (BYODs).
Following the COVID-19 outbreak though — offices around the globe were forced to shut down and send employees home, leading to a major challenge in enabling business-as-usual remotely and particularly in budgeting, acquiring and provisioning enough corporate devices to support so many remote employees. This led to a sudden spike in the need…
Yuki Arbel, VP of Product Management, Hysolate
We’re excited to introduce Isolated Workspace as-a-service, the new way to isolate your workspace that will change how users and organizations access corporate assets forever.
With our isolated workspace solution, you can now browse the web, install software, or use USB devices and other hardware with no problem. IT no longer needs to compromise on security to allow productivity. And on top of all that, organizations can allow corporate access from non-corporate devices to keep their workforce productive from anywhere.
With Hysolate, users and organizations can isolate workspaces on endpoints. Hysolate makes it…
Tal Zamir, Founder and CTO, Hysolate
Zero trust is a security model based on maintaining strict access control. It has risen in popularity since Forrester coined the term in 2010.
Initially, Zero trust referred to an enterprise security architecture that relied on a trusted internal network protected by firewalls that enforce perimeter security. However, with enterprises adopting mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce. In addition, attackers have a variety of ways to get into the internal network. One of the main methods is breaching a user’s device that is allowed to connect to the…
Oleg Zlotnik, Senior Software Engineer, Hysolate
You’re probably familiar with the concept of containers — a piece of lightweight software that bundles an application and all its dependencies and configuration into a single package, that can be easily deployed and executed reliably and deterministically on multiple different platforms, environments, and operating systems.
Containers have been very popular in recent years and were used mostly to deploy and manage applications on Linux servers. …
Yuki Arbel, VP of Product Management
It’s no secret that cyber attackers overwhelmingly target corporate endpoints. After all, they’re the gateway to the network and all that it contains. In 2019, 68% of IT security professionals said their company experienced endpoint attacks that compromised data or IT infrastructure. Since COVID-19 hit, that number just keeps growing. May and June 2020 alone saw a 34% increase in cyberattacks compared to March and April 2020.
So you can understand why many businesses believe the only way to truly protect end-user devices and sensitive company information is to lock down corporate laptops. There’s…