Don’t Toss Those Old Devices, Transform Them

Don’t Toss Those Old Devices, Transform Them

I recently blogged about how to “Secure the Rogue Workforce with Ease” with the IGEL UD Pocket. Now, let’s focus on how to deal with outdated devices, incompatible operating systems and uncooperative existing thin clients. Before you consider tossing or donating...
IGEL UD Pocket: Secure the Rogue Workforce with Ease

IGEL UD Pocket: Secure the Rogue Workforce with Ease

Security is top of mind for everyone these days, from the CISO all the way down to the end-user. The recent Equifax breech spooks the end-user, and the CISO is hoping a ransomware attack does not happen to his/her organization. Layer in the complexity of ‘bring your...
When Technologies Collide

When Technologies Collide

As folks know, Landesk/Heat/Ivanti has made many key acquisitions over the last year. I have been in and around the technology industry approximately 20 years. I started in IT, was a sales engineer but spent the bulk of my career being a product manager. Now that I am...