IGEL introduces IGEL Disaster Recovery Program

IGEL OS and the IGEL UD Pocket, bundled with expert resources including access to an IGEL Technical Relationship Manager, enables IT organizations to quickly regain control of malware affected devices and ransomware attacks to quickly restore productivity for end-users.

IGEL, provider of the managed endpoint operating system for secure access to any digital workspace, has introduced the IGEL Disaster Recovery Program. Through this new program, organizations can quickly regain control of malware affected devices to mitigate the impact of an attack, including ransomware, and quickly restore end-user productivity.

“The global acceleration of hybrid work has created a perfect storm for opportunistic cybercriminals, and earlier this year the Cybersecurity and Infrastructure Security Agency reported that it was aware of ransomware incidents against 14 of the 16 critical infrastructure sectors which include healthcare, financial services and government agencies,” said Matthias Haas, Chief Technology Officer, IGEL. “Given the reality of the current situation, it is imperative that organizations be prepared for not if, but when a cyberattack will occur. The IGEL Disaster Recovery Program provides a simple, effective, and secure way to restore end-user productivity in the shortest amount of time possible, following a ransomware or other cybersecurity incident. This is just one example of how IGEL is transforming the way the world works by creating better outcomes for people, organizations, and our planet.”

A secure and rapid response to ransomware

Through the IGEL Disaster Recovery Program, IT organizations can provide their end-users with secure and managed access to business-critical applications, data, and desktops from any device, anywhere. This includes endpoints that may be directly impacted by a cyberattack, within minutes of the attack. Since IGEL OS is read-only and tamper-proof, modular to minimize its attack surface, and includes the “chain of trust” to ensure endpoint system integrity, it serves as the ideal endpoint OS for protecting end-user devices from malware. The UD Pocket with IGEL OS enables that same level of endpoint security to run on an infected endpoint since it boots independently from USB to ensure business continuity during/after a security breach.

Through this program, an IT Administrator can also deploy and control the IGEL OS-powered devices from a single console with the IGEL Universal Management Suite (UMS). The IGEL Cloud Gateway (ICG) feature, available with IGEL OS and the IGEL UD Pocket, extends the management console reach by creating a secure, encrypted connection to each remote user device, without VPNs.

Expert resources help to accelerate deployment

Along with the IGEL UD Pocket to boot IGEL OS and remote management, the IGEL Disaster Recovery Program offers access to expert resources to help speed deployment. These include:

A Premier Technical Relationship Manager who understands the business and proactively helps the organization leverage the IGEL UD Pocket, UMS, and ICG in their environment to rapidly regain control of endpoint devices.

IGEL Academy offers focused, self-paced eLearning programs to equip IT admins with the know-how to leverage the full capabilities of IGEL OS and the UMS management console.

A survey of 650 global CISOs examines how security leaders are navigating AI adoption, expanding...
Veracode's latest report highlights the widening gap between rapid software development and slower...
Veeam has launched Agent Commander, a solution designed to combine data resilience with AI...
Infinigate UK & Ireland partners with OpenOrigins to combat deepfakes, enhancing trust in digital...
The unveiling of CrowdStrike's 2026 Global Threat Report highlights a surge in AI-enabled threats,...
Tata Group and OpenAI agree partnership spanning AI innovation, infrastructure and workforce...
Large enterprises express concern that AI may not deliver the resilience and business continuity...
While hybrid work models gain traction, mid-market firms face connectivity and security challenges...