When Technologies Collide
November 1, 2017
Don’t Toss Those Old Devices, Transform Them
November 17, 2017

IGEL UD Pocket: Secure the Rogue Workforce with Ease

Security is top of mind for everyone these days, from the CISO all the way down to the end-user. The recent Equifax breech spooks the end-user, and the CISO is hoping a ransomware attack does not happen to his/her organization. Layer in the complexity of ‘bring your own devices’ (BYOD), remote-workers, Apple users, contractors and temporary workers. According to CBS MoneyWatch, 67% of workers use their own devices at work. Gartner estimates 50% of workplaces will have a BYOD policy of sorts in 2017. CISOs are having heartburn due to the fact you cannot fully control these devices, especially Apple users. IGEL solves this issue with a simple solution… The IGEL UD Pocket:

The IGEL UD Pocket works on any x86 Architecture, 64-bit support machine so that it can work on Mac and PC:

Do not believe me? Here is the devices booting. PC Laptop:

MacBook Air:

Next, here is a simple demo of IGEL UD Pocket and the IGEL Universal Management Suite (UMS):

In a matter of 30 seconds, I can turn a Mac or PC into a usable thin client that is centrally managed. I can manage the user experience centrally from the IGEL UMS connecting it to a Citrix Cloud backend or a Citrix XenDesktop and XenApp on-premises. There is a lot this little micro client can do, but most importantly, it prevents unknown OS entities into your enterprise!

Contact XenTegra if you want to know more.

Check back for more blogs, videos, and insights on IGEL!

Pete Downing
Pete Downing
As the Chief Marketing and Technology Officer (CMTO), Pete take both skills and runs all of XenTegra's marketing, events, and partner relationships. He joined XenTegra with over 20 years of software and IT experience from leading high technology organizations. Pete is extremely technical but can enable everyone to understand any technology. Before XenTegra, Pete was Director of Product Management for RES ONE Workspace/Security and directly responsible for defining the product direction, ensuring a successful code rewrite, the roadmap and ultimately played a role in RES’s recent exit and acquisition by Ivanti. Before RES, Pete held various product management roles at Citrix, BMC Software, and Imprivata. He holds a bachelor’s degree in Sociology from the University of Massachusetts Dartmouth and an MBA from Babson College where he focused on marketing, strategy and mergers and acquisitions.


  1. Vien says:

    These are great however how do you secure them without users removing or taking them out.

Leave a Reply to Pete Downing Cancel reply

Your email address will not be published. Required fields are marked *