![]() |
![]() |
Unlimited remote access: ![]() Unlimited anytime remote access to your PC. Automatic 2-Minute Setup: ![]() The automatic download, configuration and installation take less than 2 minutes. No client software installation is necessary. Resizable Viewer: ![]() Access your host PC through a Viewer that automatically adjusts the resolution for optimal viewing. Customize your view with full-screen, actual-size or percentage-of scale options. File Transfer: ![]() Drag and drop files, folders and directories between computers. Remote Printing: ![]() Print documents from your host PC to local printers wherever you are. Desktop Shortcut: ![]() Set up an optional desktop shortcut for quick and easy access to your host PC. PocketView™: ![]() Securely access your PC from your wireless device. PocketView™ requires Windows PocketPC or CE Operating Systems. Collaboration: ![]() Invite a second person to temporarily view or share control of your PC. Draw: Use Draw to highlight graphics and sections of documents. Chat: ![]() Use Chat to communicate with guests you invite to your PC. Encryption: ![]() AES (Advanced Encryption Standard) encryption using 128-bit keys automatically protects the data stream; file transfers; chat; and keyboard and mouse input. Authentication: ![]() Dual passwords and end-to-end user authentication verify the identity of users. Viewer Security Time-Out: ![]() Configure the Viewer to time out after a period of inactivity. Host Security: ![]() Automatically zblank the host PC screen and lock the host keyboard and mouse so that they cannot accept input while a user is remotely connected. One-Time Passwords: ![]() Generate One-Time Passwords to provide an enhanced level of password security. Log-In History: ![]() Enable end users to view all log-in attempts and quickly spot any unauthorized activity. Web-Based Administer: ![]() Quickly deploy and manage remote access through an SSL-secured Administration Center. User Management: ![]() Easily add and remove user accounts within your organization. Real-Time User Control: ![]() View end-user connections in real time and end connections immediately if necessary. Feature-Access Control: ![]() Enable and disable access to features (such as File Transfer, Remote Printing and the ability to set desktop shortcuts) for each group. User PC Limit: ![]() Set a maximum number of host PCs per user to simplify license management. Password Change Enforcement: ![]() Match existing corporate password policies by preventing reuse of previous passwords and scheduling password and access code expiration at specified time intervals. Host Security Settings Enforcement: ![]() Enforce the use of end-user security settings such as host screen blanking; keyboard and mouse locking; and security time-outs. Failed Log-In Lockout: ![]() Configure lockout periods and hard lockouts for cumulative failed Web-site log-in and access code authentication attempts. Hours of Access: ![]() Define the days and times users can access corporate resources through GoToMyPC. One-Time Passwords Enforcement: ![]() Require the use of One-Time Passwords throughout your organization. RSA SecurID Integration: ![]() Integrate the GoToMyPC service with your existing RSA SecurID infrastructure. Host Computer Authorization: ![]() Administrator can authorize the setup of the client computers via an approval process that associates a unique identifier with the client computer. Users can then access their host PCs from authorized client computers only. Company Detail Report: ![]() Obtain details by user for every connection during a selected date range. Snapshot Report: ![]() Obtain a summary of connections and users during a selected date range. User Detail Report: ![]() Obtain details of a specific user's connections during a selected date range. Feature Configuration Report: ![]() Obtain information about features configured via the Administration Center. Authentication History: ![]() Obtain a summary of failed account-password and access-code changes; log-in attempts; and lockouts for all users. Enabled Host PCs Report: ![]() Obtain a summary of the host PC information (nicknames; IP addresses; and corresponding MAC addresses or serial numbers). NT-Integrated Event Log: ![]() Integrate reporting into your existing logging infrastructure by recording connections to a Windows event log. Hours of Access Report: ![]() Obtain a summary of the defined hours of access for groups and subgroups. Inventory Report: ![]() Obtain an inventory of all user accounts and PCs organized by group. |