Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Offer remote assistance for any operating system, including mobile devices, from virtually anywhere. Provide support to both PC and Mac users, enabling secure access to your computers from locations like cafes or parks. Operate directly in your web browser without needing to install any client software. Enjoy seamless and secure remote connectivity from any device and location. If you've forgotten a file on your home computer, simply connect and retrieve it effortlessly with DeskRoll. Access and manipulate remote desktops, transfer files, utilize clipboard synchronization, apply keyboard shortcuts, engage in built-in text chat, receive notifications for incoming support requests, and much more. This solution functions effectively through firewalls, proxies, and NAT configurations. Connect to remote desktops irrespective of your network setup, eliminating the need for VPN or proxy usage and avoiding the opening of additional ports. Employ mass deployment of the DeskRoll application without user intervention, manage computer access through secondary accounts and user lists, review session logs, and enhance security with two-factor authentication. With these features, remote support becomes not only efficient but also highly secure and user-friendly.
Description
IBM Sterling Secure Proxy serves as a protective barrier for your reliable network by obstructing direct connections between external partners and internal servers. It enhances the security of your network and data transfers at the network perimeter, facilitating secure business-to-business transactions and managed file transfer (MFT) file sharing. Operating as a demilitarized zone (DMZ)-based proxy, Secure Proxy incorporates multifactor authentication, SSL session terminations, the closure of inbound firewall vulnerabilities, protocol inspection, and additional controls to safeguard your trusted environment. Moreover, it offers best practices for firewall navigation aimed at strengthening perimeter security, ultimately providing greater protection for your data and trusted zone. The solution mandates multifactor authentication prior to accessing backend systems, ensuring tighter control and validation of connections. Additionally, it features proxy support and functionality designed to bolster the security of file exchanges at the network edge. With advanced routing capabilities, it streamlines infrastructure modifications, thereby saving time and minimizing the risks associated with system migrations. Overall, IBM Sterling Secure Proxy delivers a comprehensive approach to network security, reinforcing the integrity of your business operations.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
$3.25 per month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Tomsk
Founded
2013
Country
United States
Website
deskroll.com
Vendor Details
Company Name
IBM
Founded
1911
Country
United States
Website
www.ibm.com/products/secure-proxy
Product Features
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
Remote Desktop
Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management
Product Features
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning