3 Desktop as a Service (DaaS) Security Risks

Desktop-as-a-Service (DaaS) has recently gained momentum with Microsoft making Windows Virtual Desktop (WVD) generally available and increasing its investment in this service. WVD basically lets companies host low-cost Windows desktops in the cloud, as… Continue reading 3 Desktop as a Service (DaaS) Security Risks

Endpoints and Network Segmentation Best Practices

Network segmentation is a common and effective cybersecurity countermeasure. As attacks get more sophisticated, however, security tactics need to advance in parallel. For example, endpoints (laptops, desktops and workstations) are often considered amon… Continue reading Endpoints and Network Segmentation Best Practices

Have Your Cake and Eat It, Too: How Virtual Air Gap Solves Critical Digital Transformation Challenges

In the first part of this blog series, we presented three endpoint challenges enterprises must overcome in their digital transformation journeys: threat prevention, user productivity, and user privacy. In this second blog, we show how a radical new app… Continue reading Have Your Cake and Eat It, Too: How Virtual Air Gap Solves Critical Digital Transformation Challenges