The VMware Ready solution helps to improve the efficiency and agility of modern end-user computing environments
READING, UK. (Aug. 30, 2016) – IGEL Technology, a world leader in the delivery of powerful workspace management software, IGEL OS powered thin clients, zero clients and all-in-one client solutions, today announced the integration of the VMware® Blast Extreme Protocol.
“We are proud to extend our alliance with VMware, and become one of the first thin client vendors to integrate the VMware Blast Extreme protocol and the first to accelerate the protocol in a media processor,” said Simon Richards, Managing Director for IGEL Technology UK & Ireland. “IGEL is committed to helping our channel partners and their customers improve the efficiency and agility of their modern end-user computer environments, which today includes a growing mobile and remote workforce, and the VMware Blast Protocol consistently provides end users with uncompromised access to their desktops and applications, regardless of device, location or network.”
Industry-Standard Approach Offers Key Advantages
The VMware Blast Extreme Protocol, a component of VMware Horizon 7, is VMware’s next-generation display protocol that uses industry-standard H.264 video compression to provide end-users with access to their desktops and applications hosted in centrally managed environments, from any number of desktop and mobile devices.
“We wanted to quickly integrate the VMware Blast Extreme Protocol because it is a next- generation remote display protocol built on industry standards, and leverages industry standard H.264 and JPG/PNG codec technology to enable exceptional user experience on a broad range of end user devices,” said Matthias Haas, Director of Product Management, IGEL Technology.
Other features and functionality now available throughout IGEL’s entire line of VMware Certified endpoint solutions include:
- Support for server-based hardware acceleration via NVIDIA GRID™ M6, M10 and M60 graphics cards; AMD FirePro S4000X, S7000, S9000, S9050 and W7000; Intel HD Graphics P4700 and Iris Pro Graphics P630
- Endpoint hardware-based acceleration for H.264 capable devices
- Lossless CODECs that enable images to be compressed/decompressed without a loss in quality
- Support for virtual channels
“We are pleased to see IGEL Technology among the first thin client manufacturers to integrate VMware Blast protocol,” said Pat Lee, Vice President of Product Management, End User Computing, VMware. “When combined with the NVIDIA GRID graphic cards, VMware Blast is a game-changer for our customers across a wide range of industries, who faced with a growing mobile workforce, are looking for new and innovative ways to improve performance, increase efficiencies and reduce the cost of their VDI deployments.”
Simple and Secure Management
IGEL’s entire family of thin and zero clients can be managed via the industry-leading IGEL Universal Management Suite (UMS), which is designed to help IT organisations more efficiently and cost-effectively run their workspace environments remotely.
With the integration of the VMware Blast Extreme Protocol, IT organisations can now leverage the UMS to quickly transition between display methods, including other industry-standard protocols such as Microsoft Remote Desktop Protocol (RDP) and Teradici PCoIP, and make these changes for the entire network of thin clients, a group of thin clients, or specific endpoint. The UMS also enables IT organisations to add and remove endpoint devices, and perform software and hardware upgrades, as required.
Availability and Support
About IGEL Technology
A world leader in the delivery of powerful remote management software, software-defined thin clients, and thin and zero client solutions, IGEL Technology helps organisations improve the agility, efficiency, and security of their virtual desktop and application delivery systems.
IGEL produces one of the industry's widest range of hardware thin and zero clients, based on Linux and Microsoft Windows, and leads the market in software based thin clients allowing customers to access a broad spectrum of server-based infrastructures and applications. IGEL also offers powerful and intuitive management software for easy deployment and administration of thin clients throughout any size organisation. Partnerships with industry leaders including Citrix, VMware, Red Hat, Microsoft and Cisco, ensure that IGEL provides the most up-to-date technology and trustworthy security to clients in industries that include Healthcare, Education & Research, Public Sector, Financial, Insurance, Retail, Logistics, and Manufacturing.
IGEL has offices in the United Kingdom, Australia, France, the Netherlands, Austria, Belgium, Switzerland, Sweden, the United States, and Germany, and is represented by partners in over 50 countries worldwide. To learn more, visit www.igel.com
Mehdi Paryavi says people from every walk of data center life he’s met over the years call him for advice, ranging from operations staff to senior-level execs. “I have chiller technicians call me that know me from 15 years ago,” he says, adding that he’s as likely to get a call from a facilities manager as from someone configuring core switches and routers.
Paryavi says he started his career as a management and information systems engineer, became an IT manager, then learned about things like power and cooling, and eventually became a businessman. He declines to name the companies he worked for in those roles however. “Honestly, I don’t want to get into that stuff,” he says.
He also declines to name customers of his data center consultancy, TechXact, which he co-founded in 2002. “Almost anybody you think about has been a customer of ours at some point,” he says. “I don’t want to name any customers. We have a boutique data center services company, and we don’t disclose references.” More often than not, companies like to keep their data center projects secret, and it’s common for contractors they hire for those projects to be bound by non-disclosure agreements.
According to new guidance from the Department of Health and Human Service’s Office of Civil Rights (OCR), released on July 11, 2016, there have been, on average, 4,000 ransomware attacks per day since early 2016. This represents a nearly 300 percent increase over the same period in 2015. Simply put, ransomware has become the go-to threat vector because it eliminates the middle-man and monetizes instantly. It is easier to get paid directly by the victim, in untraceable bitcoin, than to exfiltrate data and attempt to sell it on the dark web.
These statistics will not surprise most health care organizations. What is surprising and perhaps concerning, is that the OCR’s guidance also claims ransomware attacks constitute not only a “security incident,” but also a “breach.” “[W]hen electronic protected health information (ePHI) is encrypted as a result of a ransomware attack, a breach has occurred because the ePHI encrypted by the ransomware was acquired (i.e., unauthorized individuals have taken possession or control of the information), and thus is a “disclosure” not permitted under the HIPAA Privacy Rule.
When it comes to cybersecurity, there’s simply no place to hide any more. Up until a year or two ago, managed service providers could advise their clients to copy data to the cloud and store it there. As long as organizations had invested resources to defend their cloud infrastructures, the IT department could always count on retrieving clean backup copies just in case intruders had corrupted company files stored in on-premises equipment. That’s no longer necessarily true, as security executives have discovered after ransomware attacks wreaked havoc with their cloud installations.
In ransomware attacks, hackers encrypt files with malware and can hold the data hostage unless the victim pays a ransom, often in the form of Bitcoins. Ransomware has proved to be quite a successful way to extort money. In the United Kingdom, for instance, more than a third of ransomware victims pay up, according to a survey by the University of Kent.
More than 120 types, or "families," of ransomware now exist, and the Department of Justice estimates that one popular ransomware strain, the CryptoLocker virus, has compromised more than 260,000 computers worldwide since its inception in 2013.
We all know the scene but choose to ignore it – a senior employee or manager is taking an online training course and is talking on the phone, writing emails and basically ignoring the training session. Why? Because it has no importance to the employee’s job. It is irrelevant but something he or she has to complete. A check the box task if ever there was one.
The picture becomes even more disturbing when in the aftermath of a bribery or price-fixing allegation outside counsel usually hears that the perpetrators attended the training, paid little attention to the training but continued to flout the law to carry out some illegal scheme. The training message clearly did not get communicated nor was it viewed as very important.
How does a company change this dynamic? How does a company use training as not only an important opportunity to inform employees about what the law requires or prohibits, but relies on training to reinforce a company’s commitment to ethics and compliance?