Compare Remote Control Software Products

  • PROXY Pro

    WORKSTATION EDITION

    Our entry level product includes the Proxy Master viewer, the Proxy Host client, and the Proxy Deployment Tool. The Proxy Master polls the network for available machines running the Proxy Host, and can conveniently list them by user name, computer name or both. Simply double-clicking a machine launches a connection - making Proxy's Workstation Edition an ideal solution for small to medium-sized businesses looking for the best on-LAN remote access and remote support tool available. Our remote control software is licensed on a per-seat basis.

    Read more

  • PROXY Pro

    GATEWAY EDITION

    To the Workstation Edition, the Gateway Edition adds a centralized server-side component called the Proxy Gateway, and is the "hub" in its "hub-and-spoke" connectivity model. Its responsibility is to negotiate connections between Master users and Host users, and is where an Administrator would centrally define (by Windows account) which users have remote control software capabilities to what machines. Additional capabilities include many-to-one connections for true collaborative support sessions, on and off LAN connectivity, screen recording & playback, Wake-on-LAN and more.

    Read more

  • PROXY Pro

    PRIVATE CLOUD EDITION

    Our flagship product adds the Proxy Web Console and it's designed to facilitate connectivity to machines from anywhere and anytime from your web browser. With this specific remote control software comes the Proxy Host on Demand, allowing users to share their screens instantly for true on-the-fly support sessions. Administrators of the Proxy Web Console enjoy a dashboard view of current remote access activity, and may also run audit reports to determine who used Proxy to access what and when. Own, operate and manage your own remote access support portal on premise.

    Read more

Compare Products

SOLUTION ARCHITECTURE
KEY DIFFERENCES BETWEEN EDITIONS
SECURITY FEATURES - IN PROXY PRO
STANDARD FEATURES - IN PROXY PRO
PROXY PRO APPLICATIONS
PROXY MASTER
The Proxy Master is our viewer, and would be installed on the PC you provide support from. Included in all products.
PROXY HOST
The Proxy Host is the clientside software that gets installed on each machine you need to corporately manage. It runs as a service, and is therefore always on, guaranteeing you access to the machine at any time.
DEPLOYMENT TOOL
The Deployment Tool is used to preconfigure Proxy Host settings, and then remotely install the software with desired settings. Can also "Update Host Settings" post-installation too.
GATEWAY
The Gateway is the "hub" in the Gateway Edition & Private spoke connectivity model. This serverside component that goes on a Windows Server 2008/2012 in your environment, and not only "centralizes" the Workstation Edition but adds numerous features.
WEB CONSOLE
The Private Cloud Edition introduces the Proxy Web Console, which installs on top of the Proxy Gateway software. Allows for browser based administration of Host machines, remote control connectivity, screen recording & playbackfrom any PC with a browser and a network connection.
HOST ON DEMAND
Installation-free client that can be activated by end users on the fly. An end user visits your Proxy Web Console landing page, clicks "Share my Desktop" which causes this temporary Proxy Host to make their machine accessible for connectivity.
iOS VIEWER
iPad and iPhone users can use the Proxy Networks Remote Desktop App, from the Apple Store, to authenticate to your Proxy Web Console and take control of Proxy Host machines. Use your Android device to manage and connect to machines and other devices (coming in late 2015).
THE HOT LIST
ON & OFF LAN
Access machines either inside or outside of your corporate LAN.
MANY-TO-ONE
Multiple users may connect to the same machine at the same time.
WAKE-ON-LAN
Send the magic packet to revive sleeping / hibernating machines.
SCREEN RECORDING & PLAYBACK
Record machines with or without being connected, and export to .WMV. Also set automatic recording rules based on events.
CENTRAL SECURITY
Centrally define which users (by Windows account) are allowed to connect to what, and what functional rights they have.
CENTRAL DATABASE
Create custom groups and place Hosts into groupsand set access policies tied to them all in one place.
CENTRAL AUDITING
Centralized audit log safely stores records all remote access activities. Run reports to determine who accessed what and when, and more.
CONNECT VIA BROWSER
Use your preferred web browser to manage machines, and take remote control of machines through your Proxy Web Console.
HOST ON DEMAND
A temporary Proxy Host client designed for onthefly support sessions. Can be removed by end user at any point, and can be "Pinned" to survive reboots & UAC prompts.
LICENSING MODELS
PER SEAT
Pay-per-seat. Ideal for companies that will be static in the amount of endpoints.
CONCURRENT MODEL
Deploy an unlimited amount of Proxy Host clients, and instead pay by the amount of people using the product at the same time.
SECURITY
WINDOWS SECURITY
Proxy uses the Windows Security Model for authentication; define access via AD users/groups.
PERMISSION TO CONNECT
Client can be set such that end users must actively click an Accept Connection dialog for attended scenarios.
IP ADDRESS RESTRICTIONS
If desired, create rules that allow or disallow connection attempts from network ranges you specify.
ENCRYPTION
All connections are encrypted using AES-256 bit (with SHA1 hash) and this is enabled in the software by default.
CONNECTION LOGGING
All connections to Proxy Host (client) machines are recorded in the Windows Event Viewer.
SSL SUPPORT
For our internet-facing products, utilize SSL to allow clients to validate the identity of your Gateway server.
CENTRALIZED SECURITY
Our server-centric products allow your administrator to centrally define who gets access to what.
CONNECTION REPORTING
Find out who connected to what and when, all connections made to a particular machine and more.
REMOTE DESKTOP
STEALTH MODE
Disabling connection beeps and connection notices allows for connectivity with no indication to the end users.
CLICK TO CONNECT
View a list of all machines, filter or search and launch connections by clicking the machine.
CONNECT w/PERMISSION
Connect without permission, connect with permission only, or connect after 30 seconds of inactivity - your choice.
"FAVORITES" LIST
Create personal list of frequently access Proxy Host machines for easy access later, double-click to reconnect.
"HISTORY" LIST
View list of your past connections, double-click to reconnect.
BANDWIDTH THROTTLING & IMAGE QUALITY
For environments with less-than-stellar network connections, turn down image quality for better performance.
CONNECTED USER(S) LIST
View the identity of the connected user(s) along with who is viewing and who has controls.
SUPPRESS INPUT
Prevent end users from using their local mouse and typing while you are connected to their machine.
ALWAYS ON (SERVICE)
Proxy Host runs as a service in Windows, so its always on and at-the-ready for connections anytime.
WINDOWS SECURITY MODEL (W/SSO)
Proxy uses the Windows Security Model, allowing administrators to set access policies tied to users/groups.
ENCRYPTION
All connections are encrypted by default with AES-256 bit.
MULTI MONITOR SUPPORT
Captures and transmits data from all connected monitors.
MONITOR SELECT
Toggle which monitor gets focused in the connection window; choose between primary, secondary, and all.
SIMPLE SEARCH
Search by PC name, logged-in user, IP address and more.
FILE TRANSFER
Drag and drop individual files or directories (w/resume).
REMOTE MANAGEMENT
Start/Stop/Restart services, kill processes, edit registry, view event viewer logs and more-behind the scenes.