Key features and capabilities.

Central control

Central control

Transfer files between a remote system and the local host or between two remote systems, as well as upload or download files on the remote device, using secure protocols like SCP and SFTP.

 
Solid authentication system

Solid authentication system

Permit users and third parties to automatically log in via various authentication services such as AD, LDAP, and Azure AD. Leverage two-factor authentication support to further fortify security.

 
Effective user management

Effective user management

Enhance user onboarding by automatically importing user groups from AD, LDAP, and Azure AD. Create custom user roles from scratch with fine-grain access scopes.

 
Access control workflow

Access control workflow

Establish a request-release mechanism that allows you to scrutinize access requests before approval. Grant users and contractors granular access to remote systems.

 
Help desk integration

Help desk integration

Reinforce access approval workflows for remote connections by incorporating ticket ID validation. Authorize users and third parties only upon ticket status verification.

 
Data center remote access

Data center remote access

Embrace simplified and direct connections to remote data centers, and automatically authenticate via jump box support for Windows and Linux platforms.

 
One-click remote sessions

One-click remote sessions

Enable users to launch tunneled RDP, SSH, SQL, and VNC connections to remote hosts via encrypted gateways. Leverage session-specific settings such as frame rate, desktop backgrounds, remote audio support, etc., for an enhanced remote connection experience.

 
RemoteApp support

RemoteApp support

Seamlessly integrate specific Windows-based remote applications into your local desktop. Allow users and third parties to locally access applications that are actually installed in the remote server.

 
Bi-directional remote file transfer

Bi-directional remote file transfer

Transfer files between a remote system and the local host or between two remote systems, as well as upload or download files on the remote device, using secure protocols like SCP and SFTP.

Privileged session management

Privileged session management

Record every privileged user session and store them as video files in an AES-256 encrypted database for post session review, and to support forensic investigations.

 
Live monitoring and collaboration

Live monitoring and collaboration

Shadow user sessions and achieve dual control on remote access. Terminate anomalous sessions instantly, and revoke access to prevent misuse.

 
In-depth audit trails

In-depth audit trails

Capture every facet of a user session as context-rich logs, and instantly send SNMP traps and syslog messages to your SIEM tools to support compliance audits.

 
Take control of how privileged users connect to remote systems, and effectively manage privileged sessions.