Compare Remote Control Software Products

  • PROXY Pro 8.10

    PRIVATE CLOUD EDITION

    Enterprise-class remote support and remote access software allowing customers to own, operate and manage their own remote access platform for support and collaboration in-house. Provides users secure, reliable, web-based access to remote desktops anywhere, anytime. Configurable service management tools and real-time reporting enable IT administrators and 3rd party service providers the ability to monitor and manage service performance, access privileges quality and usage.

  • PROXY Pro 8.10

    GATEWAY EDITION

    Centralized solution for remote access and remote control of desktops and servers inside and outside a corporate network. Our centralized server ensures reliable, secure connections with all remote desktops.

  • PROXY Pro 8.10

    WORKSTATION EDITION

    Peer-to-peer solution for remote access and remote control of desktops and servers inside a corporate network. Ideal for SMBs looking for a fast, reliable, easy-to-use remote support solution.

Compare Products

SOLUTION ARCHITECTURE
KEY DIFFERENCES BETWEEN EDITIONS
SECURITY FEATURES - IN PROXY PRO
STANDARD FEATURES - IN PROXY PRO
PROXY PRO APPLICATIONS
PROXY MASTER
The Proxy Master is our viewer, and would be installed on the PC you provide support from. Included in all products.
PROXY HOST
The Proxy Host is the clientside software that gets installed on each machine you need to corporately manage. It runs as a service, and is therefore always on, guaranteeing you access to the machine at any time.
DEPLOYMENT TOOL
The Deployment Tool is used to preconfigure Proxy Host settings, and then remotely install the software with desired settings. Can also "Update Host Settings" post-installation too.
GATEWAY
The Gateway is the "hub" in the Gateway Edition & Private spoke connectivity model. This serverside component that goes on a Windows Server 2008/2012 in your environment, and not only "centralizes" the Workstation Edition but adds numerous features.
WEB CONSOLE
The Private Cloud Edition introduces the Proxy Web Console, which installs on top of the Proxy Gateway software. Allows for browser based administration of Host machines, remote control connectivity, screen recording & playbackfrom any PC with a browser and a network connection.
HOST ON DEMAND
Installation-free client that can be activated by end users on the fly. An end user visits your Proxy Web Console landing page, clicks "Share my Desktop" which causes this temporary Proxy Host to make their machine accessible for connectivity.
iOS VIEWER
iPad and iPhone users can use the Proxy Networks Remote Desktop App, from the Apple Store, to authenticate to your Proxy Web Console and take control of Proxy Host machines. Use your Android device to manage and connect to machines and other devices (coming in late 2015).
THE HOT LIST
ON & OFF LAN
Access machines either inside or outside of your corporate LAN.
MANY-TO-ONE
Multiple users may connect to the same machine at the same time.
WAKE-ON-LAN
Send the magic packet to revive sleeping / hibernating machines.
SCREEN RECORDING & PLAYBACK
Record machines with or without being connected, and export to .WMV. Also set automatic recording rules based on events.
CENTRAL SECURITY
Centrally define which users (by Windows account) are allowed to connect to what, and what functional rights they have.
CENTRAL DATABASE
Create custom groups and place Hosts into groupsand set access policies tied to them all in one place.
CENTRAL AUDITING
Centralized audit log safely stores records all remote access activities. Run reports to determine who accessed what and when, and more.
CONNECT VIA BROWSER
Use your preferred web browser to manage machines, and take remote control of machines through your Proxy Web Console.
HOST ON DEMAND
A temporary Proxy Host client designed for onthefly support sessions. Can be removed by end user at any point, and can be "Pinned" to survive reboots & UAC prompts.
LICENSING MODELS
PER SEAT
Pay-per-seat. Ideal for companies that will be static in the amount of endpoints.
CONCURRENT MODEL
Deploy an unlimited amount of Proxy Host clients, and instead pay by the amount of people using the product at the same time.
SECURITY
WINDOWS SECURITY
Proxy uses the Windows Security Model for authentication; define access via AD users/groups.
PERMISSION TO CONNECT
Client can be set such that end users must actively click an Accept Connection dialog for attended scenarios.
IP ADDRESS RESTRICTIONS
If desired, create rules that allow or disallow connection attempts from network ranges you specify.
ENCRYPTION
All connections are encrypted using AES-256 bit (with SHA1 hash) and this is enabled in the software by default.
CONNECTION LOGGING
All connections to Proxy Host (client) machines are recorded in the Windows Event Viewer.
SSL SUPPORT
For our internet-facing products, utilize SSL to allow clients to validate the identity of your Gateway server.
CENTRALIZED SECURITY
Our server-centric products allow your administrator to centrally define who gets access to what.
CONNECTION REPORTING
Find out who connected to what and when, all connections made to a particular machine and more.
REMOTE DESKTOP
STEALTH MODE
Disabling connection beeps and connection notices allows for connectivity with no indication to the end users.
CLICK TO CONNECT
View a list of all machines, filter or search and launch connections by clicking the machine.
CONNECT w/PERMISSION
Connect without permission, connect with permission only, or connect after 30 seconds of inactivity - your choice.
"FAVORITES" LIST
Create personal list of frequently access Proxy Host machines for easy access later, double-click to reconnect.
"HISTORY" LIST
View list of your past connections, double-click to reconnect.
BANDWIDTH THROTTLING & IMAGE QUALITY
For environments with less-than-stellar network connections, turn down image quality for better performance.
CONNECTED USER(S) LIST
View the identity of the connected user(s) along with who is viewing and who has controls.
SUPPRESS INPUT
Prevent end users from using their local mouse and typing while you are connected to their machine.
ALWAYS ON (SERVICE)
Proxy Host runs as a service in Windows, so its always on and at-the-ready for connections anytime.
WINDOWS SECURITY MODEL (W/SSO)
Proxy uses the Windows Security Model, allowing administrators to set access policies tied to users/groups.
ENCRYPTION
All connections are encrypted by default with AES-256 bit.
MULTI MONITOR SUPPORT
Captures and transmits data from all connected monitors.
MONITOR SELECT
Toggle which monitor gets focused in the connection window; choose between primary, secondary, and all.
SIMPLE SEARCH
Search by PC name, logged-in user, IP address and more.
FILE TRANSFER
Drag and drop individual files or directories (w/resume).
REMOTE MANAGEMENT
Start/Stop/Restart services, kill processes, edit registry, view event viewer logs and more-behind the scenes.