Press "Enter" to skip to content

Secure End User Computing from Anywhere

IGEL has expanded its UD Pocket family of portable USB devices with the UD Pocket2 featuring both a USB-A and a USB-C connector, making it compatible with legacy and modern devices. 

Enabling secure and rapid access from any x86-64 endpoint to any managed cloud or VDI workspace, the UD Pocket2 is an ideal solution for bring-your-own-device (BYOD) users, staff working from home or organisations that wish to repurpose ageing or existing hardware to allow managed access to the company network or cloud workloads from anywhere. 

IGEL CTO Matthias Haas said: “With an innovative, new reversible 2-in-1 design, the UD Pocket2 offers the versatility to transform both legacy systems as well as the latest devices with USB Type-C interfaces into a fully functional IGEL OS-powered endpoint for secure, manageable access to VDI, cloud workspaces and virtualised apps. At a time when enterprises need the ability to rapidly and securely help their people remain productive from anywhere, the UD Pocket2 packs an elegant solution into a conveniently compact and cost-effective USB device.” 

The UD Pocket2 is preinstalled with IGEL OS Workspace Edition software and features built-in support for over 100 integrated partner technologies. 

Organisations can manage any endpoint enabled with a UD Pocket2 device (or a UD Pocket USB-A device) using the IGEL Universal Management Suite (UMS). With the ability to securely manage up to 300,000 IGEL OS-powered endpoints on or off the corporate network via a single console, IGEL UMS makes endpoint management and control simple and secure, even across enterprises with a dispersed and diverse infrastructure of hardware brands. 

For users working remotely or from home, the UD Pocket2 with IGEL OS is highly secure thanks to its read-only, Linux-based operating system and support of two-factor authentication and trusted execution. The UD Pocket2 also helps defend against the growing threat of ransomware on the endpoint, as it can be used to provide swift disaster recovery should an endpoint become infected.

To watch a video of the implementation, please visit watch?v=m3mgvuhxi_8

Business Info Magazine & Site is Published by Kingswood Media 2022