IGEL Disaster Recovery Program Introduced
August 10, 2022
Share this

IGEL announced the introduction of the IGEL Disaster Recovery Program.

Through this new program, organizations can quickly regain control of malware affected devices to mitigate the impact of an attack, including ransomware, and quickly restore end-user productivity.

“The global acceleration of hybrid work has created a perfect storm for opportunistic cybercriminals, and earlier this year the Cybersecurity and Infrastructure Security Agency reported that it was aware of ransomware incidents against 14 of the 16 critical infrastructure sectors which include healthcare, financial services and government agencies,” said Matthias Haas, CTO, IGEL. “Given the reality of the current situation, it is imperative that organizations be prepared for not if, but when a cyberattack will occur. The IGEL Disaster Recovery Program provides a simple, effective, and secure way to restore end-user productivity in the shortest amount of time possible, following a ransomware or other cybersecurity incident. This is just one example of how IGEL is transforming the way the world works by creating better outcomes for people, organizations, and our planet.”

Through the IGEL Disaster Recovery Program, IT organizations can provide their end-users with secure and managed access to business-critical applications, data, and desktops from any device, anywhere. This includes endpoints that may be directly impacted by a cyberattack, within minutes of the attack. Since IGEL OS is read-only and tamper-proof, modular to minimize its attack surface, and includes the “chain of trust” to ensure endpoint system integrity, it serves as the ideal endpoint OS for protecting end-user devices from malware. The UD Pocket with IGEL OS enables that same level of endpoint security to run on an infected endpoint since it boots independently from USB to ensure business continuity during/after a security breach.

Through this program, an IT Administrator can also deploy and control the IGEL OS-powered devices from a single console with the IGEL Universal Management Suite (UMS). The IGEL Cloud Gateway (ICG) feature, available with IGEL OS and the IGEL UD Pocket, extends the management console reach by creating a secure, encrypted connection to each remote user device, without VPNs.

Along with the IGEL UD Pocket to boot IGEL OS and remote management, the IGEL Disaster Recovery Program offers access to expert resources to help speed deployment. These include:

- A Premier Technical Relationship Manager who understands the business and proactively helps the organization leverage the IGEL UD Pocket, UMS, and ICG in their environment to rapidly regain control of endpoint devices.

- IGEL Academy offers focused, self-paced eLearning programs to equip IT admins with the know-how to leverage the full capabilities of IGEL OS and the UMS management console.

Share this

The Latest

April 24, 2024

Over the last 20 years Digital Employee Experience has become a necessity for companies committed to digital transformation and improving IT experiences. In fact, by 2025, more than 50% of IT organizations will use digital employee experience to prioritize and measure digital initiative success ...

April 23, 2024

While most companies are now deploying cloud-based technologies, the 2024 Secure Cloud Networking Field Report from Aviatrix found that there is a silent struggle to maximize value from those investments. Many of the challenges organizations have faced over the past several years have evolved, but continue today ...

April 22, 2024

In our latest research, Cisco's The App Attention Index 2023: Beware the Application Generation, 62% of consumers report their expectations for digital experiences are far higher than they were two years ago, and 64% state they are less forgiving of poor digital services than they were just 12 months ago ...

April 19, 2024

In MEAN TIME TO INSIGHT Episode 5, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses the network source of truth ...

April 18, 2024

A vast majority (89%) of organizations have rapidly expanded their technology in the past few years and three quarters (76%) say it's brought with it increased "chaos" that they have to manage, according to Situation Report 2024: Managing Technology Chaos from Software AG ...

April 17, 2024

In 2024 the number one challenge facing IT teams is a lack of skilled workers, and many are turning to automation as an answer, according to IT Trends: 2024 Industry Report ...

April 16, 2024

Organizations are continuing to embrace multicloud environments and cloud-native architectures to enable rapid transformation and deliver secure innovation. However, despite the speed, scale, and agility enabled by these modern cloud ecosystems, organizations are struggling to manage the explosion of data they create, according to The state of observability 2024: Overcoming complexity through AI-driven analytics and automation strategies, a report from Dynatrace ...

April 15, 2024

Organizations recognize the value of observability, but only 10% of them are actually practicing full observability of their applications and infrastructure. This is among the key findings from the recently completed Logz.io 2024 Observability Pulse Survey and Report ...

April 11, 2024

Businesses must adopt a comprehensive Internet Performance Monitoring (IPM) strategy, says Enterprise Management Associates (EMA), a leading IT analyst research firm. This strategy is crucial to bridge the significant observability gap within today's complex IT infrastructures. The recommendation is particularly timely, given that 99% of enterprises are expanding their use of the Internet as a primary connectivity conduit while facing challenges due to the inefficiency of multiple, disjointed monitoring tools, according to Modern Enterprises Must Boost Observability with Internet Performance Monitoring, a new report from EMA and Catchpoint ...

April 10, 2024

Choosing the right approach is critical with cloud monitoring in hybrid environments. Otherwise, you may drive up costs with features you don’t need and risk diminishing the visibility of your on-premises IT ...