Skip to main content

IGEL Disaster Recovery Program Introduced

IGEL announced the introduction of the IGEL Disaster Recovery Program.

Through this new program, organizations can quickly regain control of malware affected devices to mitigate the impact of an attack, including ransomware, and quickly restore end-user productivity.

“The global acceleration of hybrid work has created a perfect storm for opportunistic cybercriminals, and earlier this year the Cybersecurity and Infrastructure Security Agency reported that it was aware of ransomware incidents against 14 of the 16 critical infrastructure sectors which include healthcare, financial services and government agencies,” said Matthias Haas, CTO, IGEL. “Given the reality of the current situation, it is imperative that organizations be prepared for not if, but when a cyberattack will occur. The IGEL Disaster Recovery Program provides a simple, effective, and secure way to restore end-user productivity in the shortest amount of time possible, following a ransomware or other cybersecurity incident. This is just one example of how IGEL is transforming the way the world works by creating better outcomes for people, organizations, and our planet.”

Through the IGEL Disaster Recovery Program, IT organizations can provide their end-users with secure and managed access to business-critical applications, data, and desktops from any device, anywhere. This includes endpoints that may be directly impacted by a cyberattack, within minutes of the attack. Since IGEL OS is read-only and tamper-proof, modular to minimize its attack surface, and includes the “chain of trust” to ensure endpoint system integrity, it serves as the ideal endpoint OS for protecting end-user devices from malware. The UD Pocket with IGEL OS enables that same level of endpoint security to run on an infected endpoint since it boots independently from USB to ensure business continuity during/after a security breach.

Through this program, an IT Administrator can also deploy and control the IGEL OS-powered devices from a single console with the IGEL Universal Management Suite (UMS). The IGEL Cloud Gateway (ICG) feature, available with IGEL OS and the IGEL UD Pocket, extends the management console reach by creating a secure, encrypted connection to each remote user device, without VPNs.

Along with the IGEL UD Pocket to boot IGEL OS and remote management, the IGEL Disaster Recovery Program offers access to expert resources to help speed deployment. These include:

- A Premier Technical Relationship Manager who understands the business and proactively helps the organization leverage the IGEL UD Pocket, UMS, and ICG in their environment to rapidly regain control of endpoint devices.

- IGEL Academy offers focused, self-paced eLearning programs to equip IT admins with the know-how to leverage the full capabilities of IGEL OS and the UMS management console.

The Latest

An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...

In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...

Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...

As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

Image
Azul

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ... 

IGEL Disaster Recovery Program Introduced

IGEL announced the introduction of the IGEL Disaster Recovery Program.

Through this new program, organizations can quickly regain control of malware affected devices to mitigate the impact of an attack, including ransomware, and quickly restore end-user productivity.

“The global acceleration of hybrid work has created a perfect storm for opportunistic cybercriminals, and earlier this year the Cybersecurity and Infrastructure Security Agency reported that it was aware of ransomware incidents against 14 of the 16 critical infrastructure sectors which include healthcare, financial services and government agencies,” said Matthias Haas, CTO, IGEL. “Given the reality of the current situation, it is imperative that organizations be prepared for not if, but when a cyberattack will occur. The IGEL Disaster Recovery Program provides a simple, effective, and secure way to restore end-user productivity in the shortest amount of time possible, following a ransomware or other cybersecurity incident. This is just one example of how IGEL is transforming the way the world works by creating better outcomes for people, organizations, and our planet.”

Through the IGEL Disaster Recovery Program, IT organizations can provide their end-users with secure and managed access to business-critical applications, data, and desktops from any device, anywhere. This includes endpoints that may be directly impacted by a cyberattack, within minutes of the attack. Since IGEL OS is read-only and tamper-proof, modular to minimize its attack surface, and includes the “chain of trust” to ensure endpoint system integrity, it serves as the ideal endpoint OS for protecting end-user devices from malware. The UD Pocket with IGEL OS enables that same level of endpoint security to run on an infected endpoint since it boots independently from USB to ensure business continuity during/after a security breach.

Through this program, an IT Administrator can also deploy and control the IGEL OS-powered devices from a single console with the IGEL Universal Management Suite (UMS). The IGEL Cloud Gateway (ICG) feature, available with IGEL OS and the IGEL UD Pocket, extends the management console reach by creating a secure, encrypted connection to each remote user device, without VPNs.

Along with the IGEL UD Pocket to boot IGEL OS and remote management, the IGEL Disaster Recovery Program offers access to expert resources to help speed deployment. These include:

- A Premier Technical Relationship Manager who understands the business and proactively helps the organization leverage the IGEL UD Pocket, UMS, and ICG in their environment to rapidly regain control of endpoint devices.

- IGEL Academy offers focused, self-paced eLearning programs to equip IT admins with the know-how to leverage the full capabilities of IGEL OS and the UMS management console.

The Latest

An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...

In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...

Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...

As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

Image
Azul

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...