Cross-platform remote control
Establish connections between computers running an unrivalled mix of Windows, Mac OS X, UNIX, and Linux operating systems.
VNC is available in English, French, German and Spanish. VNC programs automatically run in the desktop language of the user.
Prevent unauthorized access with a password specific to VNC. Note passwords are always encrypted, even if encryption is turned off or not supported.
128-bit AES encryption
Encrypt connections using 128-bit AES, for high performance encryption. This means that all data transmitted in either direction while connections are in progress is resistant to packet sniffing and tampering, man-in-the-middle attacks, and other malicious eavesdropping.
Authorize users to connect using the already-familiar credentials of their own user accounts on a computer. Note passwords are always encrypted, even if encryption is turned off or not supported.
Patented algorithms for encoding screen data enable the user experience to be as seamless as your network connection will allow.
Enable connected users to print files directly to printers connected to their own computers.
Enable connected users to transfer files in either direction, and also share with other users connected at the same time.
Enable connected users to chat to other users connected at the same time, or with a host computer user.
Dedicated support channel
Get help when you need it, and in addition receive free upgrades for the duration of the contract. On expiry, you can renew for a competitive fee to continue receiving help and upgrades.
Single sign-on authentication
Automatically authorize users to connect using the credentials they have already entered to log on to their own computers. Note all computers must be in a managed network environment, with (for example) a Kerberos authentication server.
256-bit AES encryption
Encrypt connections using ultra-secure 256-bit AES, for ultra-high performance encryption. This means that all data transmitted in either direction while connections are in progress is resistant to packet sniffing and tampering, man-in-the-middle attacks, and other malicious eavesdropping.
Powerful deployment strategies
Remotely deploy, license, and configure VNC on potentially thousands of computers.
Configure and lock down using policy
Remotely configure and license VNC using policy. This also means VNC applications are locked down and cannot be changed by users.