Before we set yours up… firstly, what is it??
A WAY TO PROVIDE YOUR PEOPLE WITH A SECURE WORKSPACE
Business continuity, remote working, and workspace agility have become a critical business priority as organizations look to enable their workforce access to desktops, applications, and data from remote locations in the event of natural disasters and any other events that may require people to work away from their normal workplace.
Boot any x86-64 device into IGEL OS to provide a secure, performant, and managed workspace. Leaving the underlying installed operating system and files in place, the UD Pocket and UD Pocket2 provide a purpose-built environment that can connect to Office 365, Microsoft Windows Virtual Desktop, Citrix, VMware, Amazon, and many other cloud-based workspaces. With UD Pocket2, you can boot from either a USB-C or a USB-A connector.
TURN ANY DEVICE INTO AN IGEL OS-POWERED ENDPOINT
The UD Pocket and UD Pocket2 come installed with IGEL OS, a highly secure Linux-based operating system for x86-64 devices. IGEL OS provides simple, secure access to a range of virtual desktop (VDI) and Desktop as a Service (DaaS) environments. IGEL OS comes with a built-in web browser allowing easy and secure access to Office 365 and other SaaS applications.
BUSINESS CONTINUITY
Activating a work-from-home policy and providing users with secure access to virtualized desktops is made easy by simply allowing users to dual boot to the UD Pocket or UD Pocket2 from a USB-C or USB-A connector. Purpose-built and with integrated support for over 100 technologies, the UD Pocket or UD Pocket2 can be shipped to remote workers or guest users with pre-configured, instant access to VDI or DaaS cloud workspaces.
WORKING SECURELY FROM HOME
Working from home can raise security concerns. The UD Pocket, UD Pocket2, and IGEL OS provide a highly secure Linux-based operating system that is self-contained from the underlying operating system. Support of two-factor authentication and trusted execution are all standard and, combined with virtualized Windows deployment, ensures that data stays where it should.
REMOTE MANAGEMENT AND CUSTOMIZATION
Business continuity can require organizations to deliver virtualized desktops across several different regions, using products and services from different vendors. IGEL OS, the UD Pocket, and UD Pocket2 can be remotely and securely managed and controlled with the IGEL Cloud Gateway.
DIFFERENT USERS – CUSTOM REQUIREMENTS
Fully managed through the IGEL Universal Management Suite (UMS) and IGEL Cloud Gateway, each user, UD Pocket or UD Pocket2, can be controlled independently and yet managed at scale. Deploy configurations with ease through a simple drag and drop interface. Policies can be applied to change appearance, connectivity, visibility, and/or security parameters.
ENHANCED USER EXPERIENCE
By moving desktop PC workloads from the endpoint into the secure data center, which includes inherent fault tolerance and automated backups, you experience true efficiency while increasing security. The result is faster logins and application loading, more consistent operation and significantly boosted performance in database lookup or query.
GREAT, I HAVE A UD POCKET; NOW WHAT?
- Plug in your UD Pocket and turn on or restart your machine
- While it starts up, press the F12 key repeatedly until you enter “Boot Mode” or F10 if you are using an LG device
- Once in the Boot Menu - select (USB HDD: IGEL UD Pocket) to run.
- Choose the default regional options and connect to your WIFI
- Activate your IGEL OS
- Choose Request Full Feature 90-Day Evaluation
- Fill out contact information and select “Activate your OS 11”
- Cloud Gateway Agent Set up
Component | Value |
Address: | https://perfectpartners.igelcloud.com:443 |
UMS Structure Tag (Case Sensitive) | TRY-IGEL |
ICG One-TIme Password (case sensitive) | TRY-IGEL |
What will it look like once I am logged in?
- From here you can connect to your digital workspace via
- Browser, if it is Office 365
- AVD / W365
- Citrix
- VMware
- You can also connect to a local copy of Teams, Zoom and Webex
What are the Benefits?
- SECURITY: Read-only, modular OS; no data is kept on the endpoint. Security is built-in… it’s not a bolt-on.
- UNIFIED COMMUNICATIONS: Teams, Zoom, Webex, and others are optimized with media offloading and supported right out of the box.
- MANAGEMENT AND SUPPORT: Zero-touch deployment with the latest support from Citrix, VMware, and Microsoft. (Not to mention 130+ different technologies from the ecosystem.) Manage hundreds of thousands of endpoints centrally with a simple drag and drop interface and session shadowing.
Let me know if you have any questions.
Mike Broadwood