Audience

Companies of all sizes searching for an endpoint-centric web security platform

About Hysolate

Hyper-isolated environments, on a single endpoint, managed from the cloud. Hysolate is a software platform that enables locally deploying and remotely managing virtual, secured, environments on a single endpoint, with a unified and seamless user experience. Using Hysolate, organizations can implement strong OS-based isolation to secure corporate access, while unlocking user productivity. Allow employees to browse the web, install apps, and download files without compromising corporate security. Enable employees and 3rd parties to securely access corporate applications and data on unmanaged devices. Secure privileged user access through a simple-to-deploy and scalable SAW program.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Hysolate
Founded: 2016
Israel
www.hysolate.com

Videos and Screen Captures

Hysolate Screenshot 1
You Might Also Like
Vivantio IT Service Management Icon
Vivantio IT Service Management

Your service operation isn’t one-size-fits all, so your IT service management solution shouldn’t be either

The Vivantio Platform allows you to focus on the IT service management tools that make sense for your organization’s unique service model: from incident, problem and change requests, to service requests, client knowledge and asset management

Product Details

Platforms Supported
SaaS

Hysolate Frequently Asked Questions

Q: What kinds of users and organization types does Hysolate work with?
Q: What languages does Hysolate support in their product?

Hysolate Product Features

Cybersecurity

IOC Verification
Behavioral Analytics
Whitelisting / Blacklisting
Tokenization
Incident Management
AI / Machine Learning
Endpoint Management
Vulnerability Scanning

Endpoint Protection

Device Management
Application Security
Signature Matching
Antivirus
Whitelisting / Blacklisting
Behavioral Analytics
Activity Log
Web Threat Management
Encryption