PC Remote Control Anywhere, Anytime
With PROXY Pro 8.1, we’ve created powerful remote control software that allows helpdesk technicians to connect to workstations anywhere, anytime – even those behind firewalls and NAT, both on the LAN and off. Our solutions provide a level of flexibility and customization unlike any other remote control computer software. As you’ll see below, we’ve incorporated a robust feature list, which gives you and your employees remote access control at a granular level.
Safe, Secure Remote Control Software
Remote control software must be as secure as it is efficient, which is why we’ve developed our PC remote control solutions to give you access visibility and security at the highest level. To do this, we combine the 256-bit advanced encryption standard with strong authentication. We then add the ability to generate custom access lists, permissions, and audit reports – you and your support staff can easily see who connected to which machine, where, when, and for how long. Below, we’ve outlined our solution architecture, as well as which tools and features contribute to remote access, control, and management. Discover which PC remote control software would work best for your company.
- Private Cloud
PROXY Pro 8 Private Cloud Server NEWEnterprise-class server that manages large numbers of concurrent remote access and remote control connections to remote and virtual desktops through a corporation’s private cloud network and/or the public Internet. Includes:
- PROXY Pro 8 Private Cloud Administrator Console: Web-based application that enables administrators to configure and manage the Private Cloud Server
- PROXY Pro 8 Private Cloud Desktop: Web-based application that enables users and administrators to access one or more remote desktops on-demand through the Private Cloud Server
PROXY Pro 8 Master Desktop application that enables users to find, access, control and manage remote desktops through the Gateway Server PROXY Pro 8 Host Small, secure software agent that enables users to share their desktops quickly and easily; also supports unattended and/or headless machines PROXY Pro 8 Terminal Services Host Version of PROXY Pro Host that runs on terminal servers and provides remote access and remote control of terminal services sessions hosted on VMWare or Windows Terminal Services. PROXY Pro 8 Virtual Desktop Host NEWVersion of PROXY Pro Host that can be added to virtual desktop profile and will be injected into virtual desktop images (VDI)created from that profile in Citrix, VMWare and Microsoft virtual machine environments
- Private Cloud
Automated Group Management NEWConfigure Hosts to report automatically to predefined Groups on PROXY Pro Gateway Server Wake-on-LAN Send a request to turn on remote machines in standby mode Firewall-Friendly Connections Connect to remote desktops outside of the corporate network without the need to reconfigure ports Centralized Directory Organize large numbers of remote desktops into Groups, making them easier to find and manage RDP Compatibility Connect to a Windows Desktop with an active RDP session already in progress Polling DDiscover all remote desktops available in your network Always-on Service Reach remote desktops any time, even if they are unattended Connection Notifications Use audio (beep) and/or visual (popup toast, tray icon) notifications to alert remote desktop user of connection request Stealth Mode Enable silent access to remote desktops by turning off audio (beep) and visual (popup, tray icon) connection notificationsSECURITY-AUTHENTICATION Windows Authentication Use strong Windows authentication to verify credentials of users Shared-Secret Authentication Use proprietary PROXY Pro authentication if Windows authentication not available SSL Authentication Use SSL certificates to authenticate web requests to PROXY Pro Web Console or PROXY Pro Gateway End-to-End Authentication Request Windows credentials acceptable to remote desktop before executing tasks like file transfers or remote managementSECURITY-AUTHORIZATION Centralized Authorization Create and enforce standard access rights to manage general access to large numbers of remote desktops Customizable Authorization Create and enforce custom access rights to manage fine-grained access rights to specific remote desktops IP Address Restrictions Restrict access to remote desktops by IP address, IP address range and/or time zoneSECURITY-ENCRYPTION Key Strength Select encryption key strength ranging from 92- to 256-bits (default) Algorithms Select encryption algorithm, including RC4, Triple-DES, and state-of-the-art AES (default = AES)SECURITY-AUDITING Real-time Activity Reports NEWTrack user, connection, and license activities in real-time using web-based activity reports Customizable Audit Reports NEWGenerate custom reports of connection, desktop and screen recording activity for analysis
- Private Cloud
Citrix XenApp NEWAccess virtual desktops running Citrix XenApp Kernel-Mode Screen Capture Use highly-efficient kernel-mode screen capture driver for better responsiveness and performance for less active desktops User-Mode Screen Capture Use standard user-mode screen capture driver to manage responsiveness and performance for highly active desktops Remote Control Take control of mouse and keyboard input for remote desktop Bandwidth Throttling Limit bandwidth usage to enhance performance and responsiveness over slow or narrow networks links Display Options Customize view of remote desktop (Fit-to-Window, Fit 1-to-1, Full Screen) Multi-Monitor Capture remote desktop spread over multiple monitors Remote Clipboard Automatically or explicitly share clipboard content between user and remote desktop Headless Display Connect to machines without a graphics head View Only Mode Suppress keyboard/mouse input on remote desktopCOLLABORATION Active Users List View the identity of all users connected to desktop Screen Sharing Share control with other users connected to a desktop Chat Chat with user and others connected to a desktopFILE TRANSFER Bulk File Transfer Drag-and-drop files or directories between desktops Resume Resume large file transfers if connection is interruptedSCREEN RECORDING Centralized Recording Record one or more remote desktops concurrently Playback Playback screen recordings from the Gateway, the local file or over HTTP Standard Formats Convert screen recordings to .wmv format
- Private Cloud
Hardware Manager View inventory of hardware components of remote desktop Software Manager View inventory of installed software applications and Windows updates for remote desktopCONFIGURATION MANAGEMENT System Manager View all system settings for remote desktop Shared Resource Manager View shared folders and drives for remote desktop Account Manager View a list of local users and groups for remote desktop Process Manager View/start/stop processes for remote desktop Service Manager View a list of Windows services for remote desktop; start/stop/restart any Windows service Registry Manager View, edit, add or delete registry values for remote desktop Power Management Force a log off of the remote desktop user; reboot, shut down, or adjust power scheme settings to cause the machine to enter a reduced power state after inactivity Reboot in Safe Mode w/Networking Trigger a remote desktop to restart in safe mode with networking, and then reconnect while in safe mode Event Manager View Windows Event Viewer logs for remote desktopDEPLOYMENT Mass Deployment Automate the deployment of the PROXY Pro Host application to large numbers of machines in your domain using PROXY Pro Deployment Tool Custom Host Install Package Create and deploy custom versions of PROXY Pro Host application with specific settings of your choosing Active Directory Integration Discover machines accessible for deployment from your existing Active Directory OU structure Automated Updates Automate the deployment of changes in Host Settings using PROXY Pro Deployment Tool, or a command line script that can be triggered to run on startup/login via Active Directory/Group Policy