Hysolate, pioneer of secure software-defined endpoints,
today announced major extensions to the Hysolate cybersecurity isolation
platform. The new capabilities, which include granular USB control,
hypervisor-based VPN, and support for Microsoft Azure Information Protection,
make it easier than ever for enterprises to fully protect endpoints from
cyberattacks while freeing end-users to access the resources they need.
"Enterprise end-users are easy and frequent targets for cyberattackers.
To protect their devices, companies often layer on security tools and limit
what employees can access. But even that doesn't stop corporate assets from
being infiltrated," said Yuki Arbel, VP Product Management at Hysolate.
"The Hysolate Platform solves this urgent problem by re-architecting
endpoints, making them the secure and productive environments they were meant
to be. With these new capabilities, we're extending our no-compromise/no-risk
solution by enabling end-users to work in the most productive ways, while
safeguarding the crown jewels."
Hysolate revolutionizes endpoint architecture. The Hysolate Platform
automatically turns end-user devices into the world's first software-defined
endpoints, in which each endpoint has multiple isolated virtual environments.
Endpoints are built on top of a slim hypervisor layer that sits below the
operating system. Everything an end-user does happens in specified local
virtualized desktops-for example, one that's limited to sensitive corporate
data and another that allows emails and Internet browsing. The environments run
locally, side-by-side on the same device, yet are fully isolated. Applications
and services automatically launch in the correct, designated virtual
environment, making the experience seamless for end-users.
New Features for Protecting Sensitive Information:
- Granular USB Control - Hysolate eliminates the need for productivity-busting security policies that
restrict end-users from plugging USBs into their devices. Its granular USB
control identifies USB types and lets IT admins define (1) if the device should
be permitted and (2) which virtual environment each USB type can connect to.
For instance, companies can specify that USB-enabled 2FA hardware tokens like
the RSA SecurID 800 are permitted to connect to the sensitive desktop for
privileged access or access to payment systems. Companies can also allow users
to freely use USBs in the isolated internet-exposed environment without
exposing corporate assets to risk.
- Hypervisor-based VPN - Hysolate enables end-users to work remotely without security concerns. Instead
of a VPN client running within the user's operating system - which could be
compromised by malware or be exposed to an attack by a rogue WiFi network - it
is installed below the OS. Here, it securely runs in a separate, hardened,
non-persistent environment on the Hysolate hypervisor platform to ensure
sensitive environments are not at risk of compromise. With this approach, road
warriors can use their machines safely in coffee shops and on airplanes without
exposing the organization to increased risk.
- Extended Protection
for Sensitive Information - Hysolate has added support for Azure Information Protection, which classifies
data based on its sensitivity and defines how it can be accessed and shared.
This integration enables the Hysolate Platform to automatically incorporate
these classifications into policies that define what end-users can copy/paste
between virtual environments, further protecting corporate assets.