IGEL, a leading provider of the secure endpoint OS for now and next, and SentryBay, the global leader in endpoint isolation protection, announced the availability of Armored Client for IGEL on the IGEL App Portal. The Armored Client for IGEL solution, which secures all data from keystroke logging and screen capture threats on the endpoint, has been validated via the IGEL Ready technology partner program for use on IGEL OS-powered devices. As a result, the best-in-class endpoint protection used by leading businesses over several years is now available via the IGEL App Portal Cloud Service for fast, efficient app delivery to IGEL OS-powered devices.

Cyber Technology Insights: Smart Data Governance: Helping CISOs & CIOs Boost Security

“Together, IGEL and SentryBay are protecting against credential theft and data leakage threats for IGEL OS users,” said Jim Airdo, senior vice president of strategic alliances at IGEL. “By making Armored Client for IGEL available via the IGEL App Portal, we are giving our mutual customers access to proactive, proven technology that prevents data loss from keyloggers and screen capture, with cloud-direct download efficiency.”

“The availability of Armored Client for IGEL on the IGEL App Portal extends SentryBay’s commitment to protecting the entire corporate desktop within our customers. This groundbreaking partnership with IGEL extends our existing Windows and Mac support to ensure that managed as well as unmanaged devices, including BYOD and third parties, can now be fully protected from keylogging and screen capture attack vectors,” commented Tim Royston-Webb, CEO, SentryBay.

SentryBay’s Armored Client is an enterprise-grade solution that provides kernel mode anti-keylogging and anti-screen capture protection on the endpoint, which fully protects corporate applications and the data entered at the endpoint.

Armored Client nullifies the threats posed by malware and insider threats by assuming that the endpoint is compromised and proactively blocks these threats from harvesting company data. This provides end-to-end zero-day threat protection against malware threats, coupled with an enforcement component that ensures without doubt that every device connected has a critical layer of zero-day security running at the system level.

Cyber Technology Insights: Omada Chosen by Dura Vermeer to Upgrade Identity Governance

To participate in our interviews, please write to our CyberTech Media Room at news@intentamplify.com

Source – Prnewswire