skip to Main Content

Enhance EHR with AWS Isolated Recovery Environment and IGEL

Today at IGEL Now & Next, IGEL announced that it is working with key partner Amazon Web Services (AWS) to deliver an end-to-end solution for healthcare customers utilizing AWS Isolated Recovery Environment (IRE). This solution integrates IGEL’s secure endpoint technology with…

Expand App Access on IGEL OS with Progressive Web Apps

Organizations today need flexible, secure, and efficient ways to access applications across a wide range of endpoints. IGEL OS already delivers multiple options—whether through DaaS and VDI integrations with Omnissa, Microsoft, and Citrix, enterprise browsers like Edge, Firefox, and Island,…

Cloud-Powered Endpoint Management for the Modern Enterprise

Managing endpoints efficiently and securely is a top priority for IT teams, especially with the rise of hybrid work and distributed teams. Traditional endpoint management solutions often require on-premises infrastructure, which can be costly and complex to maintain. Additionally, skilled…

A Defense in Depth Approach to Business Continuity

Today at IGEL Now & Next, IGEL announced a defense in depth approach to business continuity with the new IGEL Business Continuity solution. Achieving operational resilience demands robust planning and risk management amidst constant siege from cyber threats and unforeseen…

Entering the AI Era at the Endpoint with IGEL and Lenovo

At IGEL DISRUPT 2024 in Munich this week, Lenovo presented its vision of how generative AI's next advancement will involve personalizing end-user devices. This means that computers, phones, tablets, and other devices will soon be able to understand the context…

Prevention Is The Cure

One of the founding fathers of the United States, Benjamin Franklin, once famously advised that an ounce of prevention is worth a pound of cure. While this statement was made nearly 300 years ago, it is still true, especially in…

Ransomware Endpoint Threats: How to Fight Back

As 2022 rolls on, the latest threat intelligence data from WatchGuard makes it clear that endpoint devices are a ripe target for cyberattacks. “In this new normal of hybrid workforces, endpoints can no longer rely on a strong perimeter to identify and catch the bulk of…

What is Endpoint Security?

Organizations today rely on a wide range of endpoint devices to ensure that access to their business processes run uninterrupted. This includes modern gadgets that allow employees to work remotely and conveniently, such as laptops, tablets, and smartphones, among others.…

Secure Work Must Still be the Priority – at Home and Office

Much focus and attention in recent weeks has rightly focused on work-from-home strategies and business continuity planning. But bubbling up, underneath this topical priority, is an ever-increasing resurgence of security concerns. Initially organisations had to divert all their attention in…

Don’t Fear the Zombie

Processor vulnerabilities such as Spectre and Meltdown scared computer users in 2018. Now this type of weakness is back with Fallout, ZombieLoad and RIDL. Read what IGEL does to keep our customers safe. Speculative execution is a nifty trick that…

Back To Top