skip to Main Content

Entering the AI Era at the Endpoint with IGEL and Lenovo

At IGEL DISRUPT 2024 in Munich this week, Lenovo presented its vision of how generative AI's next advancement will involve personalizing end-user devices. This means that computers, phones, tablets, and other devices will soon be able to understand the context…

Prevention Is The Cure

One of the founding fathers of the United States, Benjamin Franklin, once famously advised that an ounce of prevention is worth a pound of cure. While this statement was made nearly 300 years ago, it is still true, especially in…

Ransomware Endpoint Threats: How to Fight Back

As 2022 rolls on, the latest threat intelligence data from WatchGuard makes it clear that endpoint devices are a ripe target for cyberattacks. “In this new normal of hybrid workforces, endpoints can no longer rely on a strong perimeter to identify and catch the bulk of…

What is Endpoint Security?

Organizations today rely on a wide range of endpoint devices to ensure that access to their business processes run uninterrupted. This includes modern gadgets that allow employees to work remotely and conveniently, such as laptops, tablets, and smartphones, among others.…

Secure Work Must Still be the Priority – at Home and Office

Much focus and attention in recent weeks has rightly focused on work-from-home strategies and business continuity planning. But bubbling up, underneath this topical priority, is an ever-increasing resurgence of security concerns. Initially organisations had to divert all their attention in…

Don’t Fear the Zombie

Processor vulnerabilities such as Spectre and Meltdown scared computer users in 2018. Now this type of weakness is back with Fallout, ZombieLoad and RIDL. Read what IGEL does to keep our customers safe. Speculative execution is a nifty trick that…

IT Gets Fancy: Out of the Garage and into the Lab

IT needs to evolve and the growing complexity of the endpoint estate is certainly a driver. Where once IT people were endpoint ‘mechanics’ keeping hardware assets running like a smoothly functioning automobile, IT is now a very different game.  The…

Security: The Key to End User Computing Fulfilling on its Promise

As solution providers in the channel work to employ state-of-the-industry end user computing (EUC) solutions for their customers, security is a top-most consideration. For the channel, IGEL’s suite of endpoint security and optimization software and endpoints have been optimized to…

IGEL Furthers Product Security with Meltdown and Spectre Fix

(The following post includes new updates as of 2/2/2018) IGEL has acted quickly in response to the recently disclosed Meltdown and Spectre vulnerabilities with fixes released today. As background, Meltdown and Spectre affect computer processors, with Meltdown (CVE-2017-5754, critical) affecting…

IGEL Amps up Endpoint Security with deviceTRUST

IGEL and contextual awareness provider deviceTRUST are the perfect match.  We both believe in giving people the most flexible, secure device options possible so they can be the most productive in their work.  And we both love to push the…

New Guide: Securing IGEL OS Endpoints

Ransomware, data theft, industrial espionage - rarely a week goes by without another scary IT security story. Unsurprisingly, there are many security vendors that seem to say: 'Buy our range of products, and your worries will be over'. At IGEL…

Back To Top