Unlimited remote access: Unlimited anytime remote access to your PC. Automatic 2-Minute Setup: The automatic download, configuration and installation take less than 2 minutes. No client software installation is necessary. Resizable Viewer: Access your host PC through a Viewer that automatically adjusts the resolution for optimal viewing. Customize your view with full-screen, actual-size or percentage-of scale options. File Transfer: Drag and drop files, folders and directories between computers. Remote Printing: Print documents from your host PC to local printers wherever you are. Desktop Shortcut: Set up an optional desktop shortcut for quick and easy access to your host PC. PocketView™: Securely access your PC from your wireless device. PocketView™ requires Windows PocketPC or CE Operating Systems. Collaboration: Invite a second person to temporarily view or share control of your PC. Draw: Use Draw to highlight graphics and sections of documents. Chat: Use Chat to communicate with guests you invite to your PC. Encryption: AES (Advanced Encryption Standard) encryption using 128-bit keys automatically protects the data stream; file transfers; chat; and keyboard and mouse input. Authentication: Dual passwords and end-to-end user authentication verify the identity of users. Viewer Security Time-Out: Configure the Viewer to time out after a period of inactivity. Host Security: Automatically zblank the host PC screen and lock the host keyboard and mouse so that they cannot accept input while a user is remotely connected. One-Time Passwords: Generate One-Time Passwords to provide an enhanced level of password security. Log-In History: Enable end users to view all log-in attempts and quickly spot any unauthorized activity. Web-Based Administer: Quickly deploy and manage remote access through an SSL-secured Administration Center. User Management: Easily add and remove user accounts within your organization. Real-Time User Control: View end-user connections in real time and end connections immediately if necessary. Feature-Access Control: Enable and disable access to features (such as File Transfer, Remote Printing and the ability to set desktop shortcuts) for each group. User PC Limit: Set a maximum number of host PCs per user to simplify license management. Password Change Enforcement: Match existing corporate password policies by preventing reuse of previous passwords and scheduling password and access code expiration at specified time intervals. Host Security Settings Enforcement: Enforce the use of end-user security settings such as host screen blanking; keyboard and mouse locking; and security time-outs. Failed Log-In Lockout: Configure lockout periods and hard lockouts for cumulative failed Web-site log-in and access code authentication attempts. Hours of Access: Define the days and times users can access corporate resources through GoToMyPC. One-Time Passwords Enforcement: Require the use of One-Time Passwords throughout your organization. RSA SecurID Integration: Integrate the GoToMyPC service with your existing RSA SecurID infrastructure. Host Computer Authorization: Administrator can authorize the setup of the client computers via an approval process that associates a unique identifier with the client computer. Users can then access their host PCs from authorized client computers only. Company Detail Report: Obtain details by user for every connection during a selected date range. Snapshot Report: Obtain a summary of connections and users during a selected date range. User Detail Report: Obtain details of a specific user's connections during a selected date range. Feature Configuration Report: Obtain information about features configured via the Administration Center. Authentication History: Obtain a summary of failed account-password and access-code changes; log-in attempts; and lockouts for all users. Enabled Host PCs Report: Obtain a summary of the host PC information (nicknames; IP addresses; and corresponding MAC addresses or serial numbers). NT-Integrated Event Log: Integrate reporting into your existing logging infrastructure by recording connections to a Windows event log. Hours of Access Report: Obtain a summary of the defined hours of access for groups and subgroups. Inventory Report: Obtain an inventory of all user accounts and PCs organized by group. |