Hysolate 2.0 helps enterprises improve endpoint protection
Hysolate, pioneer of endpoint isolation solutions, announced the next version of its cybersecurity platform aimed at enterprise scalability. Hysolate 2.0 makes it easier than ever to protect hundreds of thousands of endpoints from cyber threats while freeing end-users to access the resources they need to be productive.
Advanced integration with Microsoft Active Directory, configuration management systems like Microsoft System Center Configuration Manager (SCCM), and Security Information and Event Management (SIEM) products, plus new role-based access control, let IT administrators leverage existing investments to quickly deploy Hysolate, seamlessly manage virtual endpoints and improve security posture of sensitive corporate assets.
“We’re thrilled to have so many customers using Hysolate today in production environments. Now that they’ve created more than 100,000 virtual endpoint environments—and are growing their implementations significantly—we wanted to further streamline their ability to manage Hysolate at scale,” said Yuki Arbel, VP Product Management, Hysolate.
“By enabling them to plug-and-play Hysolate into popular management and security products, we’re making it even easier to improve security posture through large-scale deployments.”
Hysolate is revolutionizing endpoint architecture by transforming end-user devices into the secure, productive environments they were meant to be. The Hysolate Platform automatically transforms each physical end-user device into multiple, fully isolated environments.
These endpoints are built on top of a bare-metal hypervisor platform that sits below the device operating system (OS). Everything an end-user does happens in segregated local virtualized operating systems—for example, one that’s locked-down and limited to sensitive resources and another for corporate day-to-day work, including email and Internet browsing.
These OS environments run locally, side-by-side on the same device. Applications and services automatically launch in the correct, designated environment, making the experience safe and seamless for end-users.
“Hysolate has been a valued business partner, responsive to our needs and committed to continually updating their solution to meet customer needs,” said William Perez, Cyber Security Lead, Connecticut Water Company.
“Hysolate has made things easier and more efficient for our field service team, as they no longer need two devices to perform their work. Instead, they can each rely on a single laptop with two isolated environments to access field equipment and perform their day-to-day corporate work, with the added cybersecurity protection offered by Hysolate.”
Extended scalability capabilities
Hysolate added advanced role-based access control to the platform’s Hysolate Management Console. This new permissions capability is critical for enterprises that have multiple IT administrators managing large deployments. It provides the control needed to ensure the integrity of their Hysolate implementation.
IT administrators can also use the Hysolate Management Console with their preferred management and security tools:
Active Directory (AD): Hysolate administrators can authenticate to the system using their AD credentials as well as be assigned administration roles based on their AD group. This makes it easy to centrally manage administrators roles using existing identity systems.
Configuration Management Systems: IT administrators can deploy Hysolate with zero-touch using standard desktop management systems such as SCCM. This allows customers to deploy Hysolate at scale using their existing systems and methodologies. Operating systems residing in the Hysolate virtual environment can still be updated using SCCM, in the same way they were updated before deploying Hysolate.
Hysolate’s two existing deployment options—Wipe & Load and Forklift—can also now be initiated using SCCM or any other configuration management system. Wipe & Load, wherein IT admins wipe end-user devices and install Hysolate environments on clean machines, is often used with hardware refresh initiatives.
Forklift, in which an existing OS image is transferred into one Hysolate virtual machine alongside a ‘blank slate’ VM that IT admins create for sensitive assets, is ideal for companies that want to accelerate Hysolate deployments, as well as for mergers and acquisitions use cases.
SIEM: Endpoint activities that Hysolate captures, such as copying and pasting between sensitive and corporate environments, and USB usage on VMs, can be transferred to a SIEM. This adds rich context to SIEM alerts, making the enterprise’s SIEM product of choice more effective.