Product

YS::Desktop - 1.1 : Isolation meets adaption

Because Real Security isn't binary
Stanislas de Truchis
December 5, 2025

Security used to be binary: locked down or wide open. But real-world operations aren’t that simple. Sometimes you need airtight isolation. Other times, a little flexibility unlocks flow, focus, or functionality. This month, we’re handing you two new controls that let you fine-tune how your environments behave. Whether you're running sensitive operations that demand dedicated network access, or just want to keep your audio while working in a secure zone, the choice is now yours.

Dedicated Network Access for Sensitive Operations

With KERYS Software, every environment has direct access to all devices. The result? An experience where users forget YS::Desktop is even running.

But not all devices are created equal. The network interface is a particularly sensitive component. In high-security contexts, like critical infrastructure maintenance or penetration testing, it must be treated with extra care.

That’s why we’ve introduced a new capability: you can now assign a machine’s Ethernet port exclusively to a specific VM. One VM. One access point. Zero compromise. Our solution adapts to your most sensitive operations.

Secure Environments Don't Have to Be Silent

You know that moment, when you’re ready to dive deep into a complex file or a high-stakes project. Focus becomes everything. And for many, audio is the anchor: a playlist, a podcast, something to block out the noise and lock into the task.

But when the work demands a fully isolated environment (no internet, no external apps) even that simple comfort can become a security risk.  

Peripheral devices, even audio interfaces, are potential vectors for compromise or cross-contamination between environments. Audio isn’t just output. It can be exploited for input, signaling, or data leakage. That’s why isolation matters.

Some customers asked for the ability to relax isolation rules when the context allows it. So, we made it possible: administrators can now choose to deprecate audio isolation directly from the console.

And yes, it also means you can keep listening to that meeting (the one you still don’t understand why you were invited) while actually working on something that matters. Let’s just say… that’s not the primary use case 😉


Security and flexibility are never finished stories. They evolve with the way people actually work. This release closes another chapter in that journey, but our product team is already shaping what comes next. See you in January, when we’ll unveil the next wave of updates designed to make secure work feel even more seamless.

Table of content

Would you like
to test our solutions?

Contact us for a free demo and see the benefits.
Book a call