IGEL Blog
IGEL DISRUPT 24 Munich Sponsor Q&A Interview: CHERRY
IGEL DISRUPT 24 Munich is just around the corner, and we are excited to bring the End User Computing (EUC) community together to learn about the latest developments and trends impacting our industry. With a packed two-day agenda, attendees will have the opportunity to engage with leading analysts, pursue technical certifications, and gain insights from the industry’s top experts.
We are continuing the IGEL DISRUPT 24 sponsor interview series with Uwe Harasko, Head of Product Management for Digital Health & Solutions at CHERRY. Read on for insights on how CHERRY partners with IGEL and why they are looking forward to joining us this year at IGEL DISRUPT 24 in Munich.
1) Why did your organization choose to sponsor IGEL DISRUPT Munich?
At DISRUPT, CHERRY can take advantage of the enthusiastic audience to highlight the integration of our products with IGEL’s infrastructure. This event provides an ideal platform not only to showcase our offerings but also to gather valuable insights. By gaining a deeper understanding of the audience’s needs and future challenges, CHERRY can collect critical feedback that will guide the development of next-generation products, enhancing endpoint security for administrators. In addition to the above, we are happy and proud to activate the IGEL Ready Partnership globally.
2) What are 2-3 things you would like attendees at IGEL DISRUPT Munich to know about your partnership with IGEL?
CHERRY has been an IGEL Ready certified partner for over four years. During this time, we have collaborated closely with IGEL’s engineering and sales teams to deliver a unique, secure endpoint solution featuring encrypted communications and our solutions for the German Healthcare project “Telematik Infrastructure.” IGEL enabled the plug-and-play use of the CHERRY eHealth Keyboard with integrated LAN Smartcard Terminal. We are now expanding our product lineup to include additional reader capabilities such as Seos, BLE, and FIDO2. Be sure to check out our demo keyboard at Disrupt. We are also looking into software/hardware full solution bundling, which plays a predominant role with system integrators/resellers, as well as on the customer level. It needs to be easy to do business with us.
3) What will your organization be presenting/showcasing at IGEL DISRUPT Munich? What do you want attendees to take away from your session/booth presentation?
Secure endpoint solutions: The CHERRY SECURE BOARD 1.0 keyboard offers maximum security at the workplace, and the integrated smart card terminal with built-in contact and contactless card (dual interface) readers meets the requirements of numerous card-based IT applications. Sensitive data, passwords, or access codes are tapped by manipulating the input device. This form of sabotage can be prevented very effectively with the SECURE BOARD 1.0. With the integrated secure mode, proof of authenticity of the device is certificate-based, and key transmission is encrypted. This makes it impossible for hardware keyloggers to intercept sensitive access data and passwords. By blocking the standard keyboard channel, “BadUSB” attacks are also a thing of the past as USB sticks that log on to the system as a keyboard cannot inject uncontrolled input and malicious code.
The keyboard is also a long-lasting companion, with its abrasion-resistant laser-marking keycaps that can withstand years of office use without any signs of wear.
CHERRY is regarded as the standard of quality, innovation, and sustainability. We invite you to try typing on one of our keyboards to experience the difference and watch our demo application for key encryption.
4) In your view, what are the key challenges/opportunities for the EUC space in the next 3-6 months? What should IT organizations be doing as they prepare for 2025?
A fundamental element of any security strategy is controlling who has access to the respective IT infrastructure. Cybersecurity is still often seen as a software problem and assumes that endpoints for trusted applications are secure. However, input devices can also be gateways through which sensitive data input can be tapped before further security measures, such as firewalls or virus scanners, even take effect. Security keyboards such as the SECURE BOARD 1.0 from CHERRY provide a remedy here.
Developments such as digitalization and big data and the exponentially growing mountains of data that come with them are sparking desire, not only from cyber criminals attacking from outside the company but also from malicious employees, external visitors, or insiders who are after information from their employers, customers, partners, and government agencies.
Recognizing this growing need, particularly in healthcare and government sectors, IT organizations should expand their focus beyond current solutions. We’re developing secure, sealed, multi-device-connected input devices specifically tailored for these security-conscious environments.
5) And, just for fun, what is your favorite thing to do during your summer holidays?
This is very easy: Stay outside as often as possible for swimming, bicycling, and running. And don’t forget the barbeque.