PC Remote Control Anywhere, Anytime

With PROXY Pro 8.1, we’ve created powerful remote control software that allows helpdesk technicians to connect to workstations anywhere, anytime – even those behind firewalls and NAT, both on the LAN and off. Our solutions provide a level of flexibility and customization unlike any other remote control computer software. As you’ll see below, we’ve incorporated a robust feature list, which gives you and your employees remote access control at a granular level.

Safe, Secure Remote Control Software

Remote control software must be as secure as it is efficient, which is why we’ve developed our PC remote control solutions to give you access visibility and security at the highest level. To do this, we combine the 256-bit advanced encryption standard with strong authentication. We then add the ability to generate custom access lists, permissions, and audit reports – you and your support staff can easily see who connected to which machine, where, when, and for how long. Below, we’ve outlined our solution architecture, as well as which tools and features contribute to remote access, control, and management. Discover which PC remote control software would work best for your company.

  • SOLUTION ARCHITECTURE

    • Workstation
    • Private Cloud
    COMPONENTS
    PROXY Pro 8 Private Cloud Server NEWEnterprise-class server that manages large numbers of concurrent remote access and remote control connections to remote and virtual desktops through a corporation’s private cloud network and/or the public Internet. Includes:
    • PROXY Pro 8 Private Cloud Administrator Console: Web-based application that enables administrators to configure and manage the Private Cloud Server
    • PROXY Pro 8 Private Cloud Desktop: Web-based application that enables users and administrators to access one or more remote desktops on-demand through the Private Cloud Server
       
    PROXY Pro 8 Master Desktop application that enables users to find, access, control and manage remote desktops through the Gateway Server    
    PROXY Pro 8 Host Small, secure software agent that enables users to share their desktops quickly and easily; also supports unattended and/or headless machines    
    PROXY Pro 8 Terminal Services Host Version of PROXY Pro Host that runs on terminal servers and provides remote access and remote control of terminal services sessions hosted on VMWare or Windows Terminal Services.    
    PROXY Pro 8 Virtual Desktop Host NEWVersion of PROXY Pro Host that can be added to virtual desktop profile and will be injected into virtual desktop images (VDI)created from that profile in Citrix, VMWare and Microsoft virtual machine environments    
  • REMOTE ACCESS

    • Workstation
    • Private Cloud
    CONNECTION MANAGEMENT
    Automated Group Management NEWConfigure Hosts to report automatically to predefined Groups on PROXY Pro Gateway Server    
    Wake-on-LAN Send a request to turn on remote machines in standby mode    
    Firewall-Friendly Connections Connect to remote desktops outside of the corporate network without the need to reconfigure ports    
    Centralized Directory Organize large numbers of remote desktops into Groups, making them easier to find and manage    
    RDP Compatibility Connect to a Windows Desktop with an active RDP session already in progress    
    Polling DDiscover all remote desktops available in your network    
    Always-on Service Reach remote desktops any time, even if they are unattended    
    Connection Notifications Use audio (beep) and/or visual (popup toast, tray icon) notifications to alert remote desktop user of connection request    
    Stealth Mode Enable silent access to remote desktops by turning off audio (beep) and visual (popup, tray icon) connection notifications    
    SECURITY-AUTHENTICATION
    Windows Authentication Use strong Windows authentication to verify credentials of users    
    Shared-Secret Authentication Use proprietary PROXY Pro authentication if Windows authentication not available    
    SSL Authentication Use SSL certificates to authenticate web requests to PROXY Pro Web Console or PROXY Pro Gateway    
    End-to-End Authentication Request Windows credentials acceptable to remote desktop before executing tasks like file transfers or remote management    
    SECURITY-AUTHORIZATION
    Centralized Authorization Create and enforce standard access rights to manage general access to large numbers of remote desktops    
    Customizable Authorization Create and enforce custom access rights to manage fine-grained access rights to specific remote desktops    
    IP Address Restrictions Restrict access to remote desktops by IP address, IP address range and/or time zone    
    SECURITY-ENCRYPTION
    Key Strength Select encryption key strength ranging from 92- to 256-bits (default)    
    Algorithms Select encryption algorithm, including RC4, Triple-DES, and state-of-the-art AES (default = AES)    
    SECURITY-AUDITING
    Real-time Activity Reports NEWTrack user, connection, and license activities in real-time using web-based activity reports    
    Customizable Audit Reports NEWGenerate custom reports of connection, desktop and screen recording activity for analysis    
  • REMOTE CONTROL

    • Workstation
    • Private Cloud
    REMOTE DESKTOP
    Citrix XenApp NEWAccess virtual desktops running Citrix XenApp    
    Kernel-Mode Screen Capture Use highly-efficient kernel-mode screen capture driver for better responsiveness and performance for less active desktops    
    User-Mode Screen Capture Use standard user-mode screen capture driver to manage responsiveness and performance for highly active desktops    
    Remote Control Take control of mouse and keyboard input for remote desktop    
    Bandwidth Throttling Limit bandwidth usage to enhance performance and responsiveness over slow or narrow networks links    
    Display Options Customize view of remote desktop (Fit-to-Window, Fit 1-to-1, Full Screen)    
    Multi-Monitor Capture remote desktop spread over multiple monitors    
    Remote Clipboard Automatically or explicitly share clipboard content between user and remote desktop    
    Headless Display Connect to machines without a graphics head    
    View Only Mode Suppress keyboard/mouse input on remote desktop    
    COLLABORATION
    Active Users List View the identity of all users connected to desktop    
    Screen Sharing Share control with other users connected to a desktop    
    Chat Chat with user and others connected to a desktop    
    FILE TRANSFER
    Bulk File Transfer Drag-and-drop files or directories between desktops    
    Resume Resume large file transfers if connection is interrupted    
    SCREEN RECORDING
    Centralized Recording Record one or more remote desktops concurrently    
    Playback Playback screen recordings from the Gateway, the local file or over HTTP    
    Standard Formats Convert screen recordings to .wmv format    
  • REMOTE MANAGEMENT

    • Workstation
    • Private Cloud
    INVENTORY REPORTING
    Hardware Manager View inventory of hardware components of remote desktop    
    Software Manager View inventory of installed software applications and Windows updates for remote desktop    
    CONFIGURATION MANAGEMENT
    System Manager View all system settings for remote desktop    
    Shared Resource Manager View shared folders and drives for remote desktop    
    Account Manager View a list of local users and groups for remote desktop    
    Process Manager View/start/stop processes for remote desktop    
    Service Manager View a list of Windows services for remote desktop; start/stop/restart any Windows service    
    Registry Manager View, edit, add or delete registry values for remote desktop    
    Power Management Force a log off of the remote desktop user; reboot, shut down, or adjust power scheme settings to cause the machine to enter a reduced power state after inactivity    
    Reboot in Safe Mode w/Networking Trigger a remote desktop to restart in safe mode with networking, and then reconnect while in safe mode    
    Event Manager View Windows Event Viewer logs for remote desktop    
    DEPLOYMENT
    Mass Deployment Automate the deployment of the PROXY Pro Host application to large numbers of machines in your domain using PROXY Pro Deployment Tool    
    Custom Host Install Package Create and deploy custom versions of PROXY Pro Host application with specific settings of your choosing    
    Active Directory Integration Discover machines accessible for deployment from your existing Active Directory OU structure    
    Automated Updates Automate the deployment of changes in Host Settings using PROXY Pro Deployment Tool, or a command line script that can be triggered to run on startup/login via Active Directory/Group Policy