Personal

Pro

Corporate

End-User Features

Unlimited Remote Access



PocketView™ Wireless Access
Collaboration

Encryption



Authentication
Viewer Security Time-Out
Host Security
One-Time Passwords
Log-In History

Administrator Features
Web-Based Administration
User Management
Real-Time User Control
Feature-Access Control
User PC Limit
Password Change Enforcement
Host Security Settings Enforcement
Failed Log-In Lockout
Hours of Access
One-Time Passwords Enforcement
RSA SecurID Integration
Host Computer Authorization
Client Computer Authorization
Company Detail Report
Snapshot Report
User Detail Report
Feature Configuration Report
Authentication History
Enabled Host PCs Report
NT-Integrated Event Log
Hours of Access Report
Inventory



Unlimited remote access:

Unlimited anytime remote access to your PC.

Automatic 2-Minute Setup:
The automatic download, configuration and installation take less than 2 minutes. No client software installation is necessary.


Resizable Viewer:

Access your host PC through a Viewer that automatically adjusts the resolution for optimal viewing. Customize your view with full-screen, actual-size or percentage-of scale options.

File Transfer:
Drag and drop files, folders and directories between computers.

Remote Printing:
Print documents from your host PC to local printers wherever you are.

Desktop Shortcut:
Set up an optional desktop shortcut for quick and easy access to your host PC.

PocketView™:

Securely access your PC from your wireless device.
PocketView™ requires Windows PocketPC or CE Operating Systems.

Collaboration:

Invite a second person to temporarily view or share control of your PC. Draw: Use Draw to highlight graphics and sections of documents.

Chat:
Use Chat to communicate with guests you invite to your PC.

Encryption:

AES (Advanced Encryption Standard) encryption using 128-bit keys automatically protects the data stream; file transfers; chat; and keyboard and mouse input.

Authentication:

Dual passwords and end-to-end user authentication verify the identity of users.

Viewer Security Time-Out:

Configure the Viewer to time out after a period of inactivity.

Host Security:

Automatically zblank the host PC screen and lock the host keyboard and mouse so that they cannot accept input while a user is remotely connected.

One-Time Passwords:

Generate One-Time Passwords to provide an enhanced level of password security.

Log-In History:

Enable end users to view all log-in attempts and quickly spot any unauthorized activity.

Web-Based Administer:

Quickly deploy and manage remote access through an SSL-secured Administration Center.

User Management:

Easily add and remove user accounts within your organization.

Real-Time User Control:

View end-user connections in real time and end connections immediately if necessary.

Feature-Access Control:

Enable and disable access to features (such as File Transfer, Remote Printing and the ability to set desktop shortcuts) for each group.

User PC Limit:

Set a maximum number of host PCs per user to simplify license management.

Password Change Enforcement:

Match existing corporate password policies by preventing reuse of previous passwords and scheduling password and access code expiration at specified time intervals.

Host Security Settings Enforcement:

Enforce the use of end-user security settings such as host screen blanking; keyboard and mouse locking; and security time-outs.

Failed Log-In Lockout:

Configure lockout periods and hard lockouts for cumulative failed Web-site log-in and access code authentication attempts.

Hours of Access:

Define the days and times users can access corporate resources through GoToMyPC.

One-Time Passwords Enforcement:

Require the use of One-Time Passwords throughout your organization.

RSA SecurID Integration:

Integrate the GoToMyPC service with your existing RSA SecurID infrastructure.

Host Computer Authorization:

Administrator can authorize the setup of the client computers via an approval process that associates a unique identifier with the client computer. Users can then access their host PCs from authorized client computers only.

Company Detail Report:

Obtain details by user for every connection during a selected date range.

Snapshot Report:

Obtain a summary of connections and users during a selected date range.

User Detail Report:

Obtain details of a specific user's connections during a selected date range.

Feature Configuration Report:

Obtain information about features configured via the Administration Center.

Authentication History:

Obtain a summary of failed account-password and access-code changes; log-in attempts; and lockouts for all users.

Enabled Host PCs Report:

Obtain a summary of the host PC information (nicknames; IP addresses; and corresponding MAC addresses or serial numbers).

NT-Integrated Event Log:

Integrate reporting into your existing logging infrastructure by recording connections to a Windows event log.

Hours of Access Report:

Obtain a summary of the defined hours of access for groups and subgroups.

Inventory Report:

Obtain an inventory of all user accounts and PCs organized by group.