Hysolate, pioneer of endpoint isolation solutions, today
announced the next version of its cybersecurity platform aimed at enterprise
scalability. Hysolate 2.0 makes it easier than ever to protect hundreds of
thousands of endpoints from cyber threats while freeing end-users to access the
resources they need to be productive. Advanced integration with Microsoft
Active Directory, configuration management systems like Microsoft System Center
Configuration Manager (SCCM), and Security Information and Event Management
(SIEM) products, plus new role-based access control, let IT administrators
leverage existing investments to quickly deploy Hysolate, seamlessly manage
virtual endpoints and improve security posture of sensitive corporate assets.
"We're thrilled to have so many customers using Hysolate today in
production environments. Now that they've created more than 100,000 virtual
endpoint environments-and are growing their implementations significantly-we
wanted to further streamline their ability to manage Hysolate at scale,"
said Yuki Arbel, VP Product Management, Hysolate. "By enabling them to
plug-and-play Hysolate into popular management and security products, we're
making it even easier to improve security posture through large-scale
deployments."
Hysolate is revolutionizing endpoint architecture by transforming end-user
devices into the secure, productive environments they were meant to be. The
Hysolate Platform automatically transforms each physical end-user device into
multiple, fully isolated environments. These endpoints are built on top of a
bare-metal hypervisor platform that sits below the device operating system (OS).
Everything an end-user does happens in segregated local virtualized operating
systems-for example, one that's locked-down and limited to sensitive resources
and another for corporate day-to-day work, including email and Internet
browsing. These OS environments run locally, side-by-side on the same device.
Applications and services automatically launch in the correct, designated
environment, making the experience safe and seamless for end-users.
"Hysolate has been a valued business partner, responsive to our needs
and committed to continually updating their solution to meet customer
needs," said William Perez, Cyber Security Lead, Connecticut Water
Company. "Hysolate has made things easier and more efficient for our field
service team, as they no longer need two devices to perform their work.
Instead, they can each rely on a single laptop with two isolated environments
to access field equipment and perform their day-to-day corporate work, with the
added cybersecurity protection offered by Hysolate."
Extended Scalability Capabilities
Hysolate added advanced role-based access control to the platform's Hysolate
Management Console. This new permissions capability is critical for enterprises
that have multiple IT administrators managing large deployments. It provides
the control needed to ensure the integrity of their Hysolate implementation.
IT administrators can also use the Hysolate Management Console with their
preferred management and security tools:
- Active
Directory (AD): Hysolate administrators can authenticate to the system
using their AD credentials as well as be assigned administration roles
based on their AD group. This makes it easy to centrally manage
administrators roles using existing identity systems.
- Configuration
Management Systems: IT administrators can deploy Hysolate with zero-touch
using standard desktop management systems such as SCCM. This allows
customers to deploy Hysolate at scale using their existing systems and
methodologies. Operating systems residing in the Hysolate virtual environment
can still be updated using SCCM, in the same way they were updated before
deploying Hysolate.
- SIEM: Endpoint activities that Hysolate
captures, such as copying and pasting between sensitive and corporate
environments, and USB usage on VMs, can be transferred to a SIEM. This adds
rich context to SIEM alerts, making the enterprise's SIEM product of choice
more effective.
Hysolate's two existing deployment options-Wipe & Load and Forklift-can
also now be initiated using SCCM or any other configuration management system.
Wipe & Load, wherein IT admins wipe end-user devices and install Hysolate
environments on clean machines, is often used with hardware refresh
initiatives. Forklift, in which an existing OS image is transferred into one
Hysolate virtual machine alongside a 'blank slate' VM that IT admins create for
sensitive assets, is ideal for companies that want to accelerate Hysolate
deployments, as well as for mergers and acquisitions use cases.