IntraSystems Introduces Pandemic Business Continuity Services

The Coronavirus (COVID-19) has become a global pandemic and has impacted the workforce in many unforeseen and unexpected ways.  This has not only led to quarantines throughout the country, but has also led to many employees having to work remote.

In an effort to help our customers who may be in need of additional short-term services (due to employees having to work remotely), IntraSystems is offering Pandemic Business Continuity Services to ensure your organization has the tools to allow your teams to collaborate and share files seamlessly which, in turn, enable a productive remote workforce.  Additionally, cyber criminals are taking advantage of the newly remote workforce as many do not have the same security on their home networks as their corporate environment.  Many organizations haven’t deployed the right technologies or corporate security policies to ensure that all corporate-owned or corporate-managed devices have the exact same security protections implemented – regardless of whether they’re connected to an enterprise network or an open home Wi-Fi network.  To learn more, see Cybersecurity Awareness Key Strategies and Cybersecurity Awareness Recommendations to help your organization.

Please see below for a variety of tailored solutions from IntraSystems that will allow employees to remain productive while also being secure.


Guidelines for Maintaining Business Continuity For Your Organization

Don’t risk a major interruption to your business. Download this whitepaper and learn valuable guidelines for creating an effective business continuity strategy, including why:

– A continuity strategy is about more than just IT availability and failover
– Workforce continuity is just as important as business continuity
– All areas of your business must be included in your approach

Start now, before it’s too late.



Expand Citrix Virtual Apps and Desktops (CVAD)

This is best for organizations who already have the available infrastructure or have already migrated to the cloud. You can quickly expand your CVAD environment to cater to additional load.

Remote PC Access

This enables physical desktops to be remotely accessible – like virtual desktop. This would deploy Virtual Delivery Agent (VDA) to physical desktops to use in conjunction with an existing CVAD environment or new CVAD service.  This is a great option if the additional infrastructure for VDI is not available.

Use Citrix Cloud on Public Cloud

Citrix Cloud is an ideal solution for organizations with an on-prem CVAD environment without the available infrastructure or organizations that do not have a CVAD environment. Either Citrix Managed Desktops (Azure only) or the CVAD service can enable organizations to quickly ramp up VDI workloads on a public cloud of your choice.


UD Pocket

IGEL’s USB based UD Pocket can temporarily turn any PC, laptop, or tablet into a secure IGEL OS-powered device – very cost effective – allowing access for displaced workers


IGEL OS for cloud workspaces can easily run on a broad range of compatible 64-bit, x86 devices, including highly mobile portable endpoints

Remote Access

Combining Citrix, VMware, and Microsoft with IGEL OS can enable remote workers to easily access their corporate desktop and applications from anywhere


Phishing Attacks

Hackers have created new attacks based on the intense public interest in this virus. One of the most common of these attacks is an email impersonation attack (i.e. from WHO or CDC).

SSL VPN & Remote Access

Many employees are needing remote access today that require a quick, flexible, reliable, and completely secure way to connect to internal business applications, information, and network resources. They want to do this from anywhere in the world, at any time, from any suitable device. The Barracuda SSL VPN provides the security and connectivity to deliver this access, via a web browser or mobile device.

Check Point

IMPORTANT ANNOUNCEMENT:  Increase in DDoS Activity Occurring | IntraSystems and Check Point COVID-19 Update_040320
Products and Services to Securely Connect Your Remote Workforce

Check Point’s Infinity portfolio of products and services can provide your remote workers with advanced threat protection, updated in real-time by ThreatCloud threat intelligence while leveraging a Zero Trust approach to access management.  Your remote workers are also integrated into the same unified security management system that you use to protect your enterprise data center, cloud, and branch offices.  Protect your remote workers using Check Point’s secure access products and services below:

  • Remote Access VPN Software | This ensure that the connections between corporate networks and remote and mobile devices are secure and can be accessed virtually anywhere users are located.  A secure remote access solution promotes collaboration by connecting global virtual teams at headquarters, branch offices, remote locations, or mobile users on the go. Each host typically has VPN client software loaded or uses a web-based client. Privacy and integrity of sensitive information is ensured through multi-factor authentication; endpoint system compliance scanning; and encryption of all transmitted data.
  • Endpoint Threat Protection | Check Point’s innovative threat prevention technologies use static, dynamic, behavioral detection and prevention technologies with advanced artificial intelligence to provide high catch rates and low false positives.  It assures continuous collection of comprehensive and complete raw forensics data – employing full attack remediation capabilities.  Additionally, it integrates into Check Point’s Infinity to get maximum prevention across all attack surfaces, shared intelligence, and a single point of management (cloud service or on-premise).
  • Mobile Security |With Check Point’s Advanced Threat Protection, you can stay protected from malware, phishing, Man-in-the-Middle attacks, and operating system exploits.  SandBlast Mobile’s cloud-based dashboard provides real-time risk assessments and visibility into threats impacting your mobile fleet.  With SandBlast Mobile, it’s intuitive to use and you’ll only get notified if under attack.  All user and corporate data is kept completely safe.
  • Mobile Secure Workplace | Check Point Capsule Mobile Secure Workspace is a mobile security container that creates an isolated corporate workspace on personal devices, making it simple to secure corporate data and assets both inside and outside the corporate network.  It includes simplified management; prevents data loss; and provides a seamless user experience.

Microsoft Azure

Quick Deployment

Deploying workloads on Microsoft Azure cloud enables agile desktops and application delivery. Quickly deploy Windows Virtual Desktops for displaced workers.


Remote Infrastructure Testing

Suddenly, a high percentage of your company needs to work from home.   We can help you prepare your infrastructure to support such requests (mandates in some cases). Login VSI can test and validate your remote infrastructure, helping you to ensure business continuity. With Login Enterprise load testing, IT organizations can be sure they are keeping remote employees fully engaged.  Additionally, Login VSI can quickly test your entire remote environment, be it EUC technologies, such as Citrix Virtual Apps and Desktops, VMware Horizon or Microsoft RDS and WVD.

IntraSystems is here to help you implement solutions to continue your teams’ collaboration and to maintain business continuity. Our Service and Consulting teams, in partnership with our key vendors, can provide rapid deployment of a remote worker solution. IntraSystems has 24 years’ experience and expertise in building secure solutions to allow employees to work remotely and be productive.

Protect your business from disruptions and keep your workforce productive!

Contact Us Now

WordPress Appliance - Powered by TurnKey Linux