Results for: ir remote control manager

Suggested Categories:

Remote Desktop Software
Remote desktop software enables users to access and control a computer from a different location over the internet or a local network. It allows for remote troubleshooting, file transfers, and software management as if the user were physically in front of the machine. Businesses rely on it for IT support, remote work, and server administration, while individuals use it to access personal or work computers from anywhere. Security measures such as encryption and multi-factor authentication help protect remote connections from unauthorized access. This technology enhances productivity and flexibility by providing seamless access to important files and applications.
Remote Support Software
Remote support software enables technicians, IT teams, and service providers to access and troubleshoot devices from anywhere in the world. It allows secure, real-time connections to desktops, laptops, mobile devices, and servers to diagnose issues, perform updates, and provide guidance. These tools often include features such as file transfer, session recording, multi-platform compatibility, and integrated chat or voice communication. By reducing the need for on-site visits, remote support software helps organizations save time, cut costs, and resolve problems faster. It’s essential for IT helpdesks, managed service providers, and companies supporting remote or hybrid workforces.
Remote Work Software
Remote work software encompasses a suite of tools and platforms designed to facilitate seamless collaboration, communication, and productivity for distributed teams. These solutions include video conferencing tools, project management platforms, cloud-based document sharing, and team chat applications. They enable employees to work from anywhere while staying connected to their colleagues and maintaining efficient workflows. Key features often include real-time collaboration, secure access to files, task tracking, and integrations with other business tools. Remote work software has become essential in today's hybrid and remote-first workplaces, promoting flexibility and enhancing team performance across geographic boundaries.
Version Control Systems
Version control systems help development teams track, manage, and organize changes to source code and other digital files over time. They allow multiple contributors to collaborate simultaneously while maintaining a complete history of revisions and updates. The software supports branching, merging, and rollback features to reduce errors and improve development workflows. Many version control systems integrate with CI/CD pipelines, project management tools, and code review platforms. By ensuring consistency, accountability, and collaboration, version control systems are essential for modern software development.
Document Control Software
Document control software is designed to manage and track documents throughout their lifecycle, ensuring that they are properly stored, organized, and accessible. It provides features like version control, audit trails, and access permissions to maintain document integrity and security. This software helps organizations maintain compliance with industry standards and regulations by ensuring documents are updated and reviewed in a controlled manner. It also facilitates the efficient sharing and retrieval of documents, reducing the risk of errors or outdated information being used. By centralizing document management, document control software streamlines workflows and improves collaboration while minimizing risks associated with document mismanagement.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Remote Patient Monitoring Software
Remote patient monitoring software enables healthcare providers to track patients’ vital signs and health data in real-time from a distance using connected devices. It collects data such as heart rate, blood pressure, glucose levels, and oxygen saturation, transmitting it securely to clinicians for continuous monitoring. This software helps detect early signs of deterioration, facilitates timely interventions, and supports chronic disease management outside traditional clinical settings. Integration with electronic health records (EHR) and alert systems ensures that care teams stay informed and can respond quickly. Ultimately, remote patient monitoring improves patient outcomes, reduces hospital visits, and enhances the quality of care.
Document Version Control Software
Document version control software is designed to track and manage changes made to documents over time, ensuring that all revisions are properly recorded and organized. It allows users to store multiple versions of a document, making it easy to view, compare, and restore previous versions if needed. The software typically includes features like automated version tracking, timestamps, and user identification to provide a clear history of document edits. By managing versions efficiently, it helps prevent conflicts or errors from outdated or conflicting document versions. This type of software is essential for maintaining accuracy, transparency, and collaboration, especially in environments with frequent document updates and multiple contributors.
Inventory Control Software
Inventory control software helps businesses manage and track their inventory levels, ensuring that stock is accurately recorded and available when needed. It automates processes like stock replenishment, order management, and tracking inventory across multiple locations. The software often includes features such as real-time inventory updates, barcode scanning, and alerts for low stock levels, helping prevent overstocking or stockouts. By providing detailed insights into inventory movements, it improves accuracy, reduces manual errors, and enhances operational efficiency. Ultimately, inventory control software optimizes stock management, reduces costs, and supports better decision-making for supply chain and warehouse operations.
Remote Deposition Software
Remote deposition software enables legal professionals to conduct depositions virtually, connecting witnesses, attorneys, and court reporters via secure video conferencing. It offers features like real-time transcription, document sharing, and video recording to ensure accurate and efficient legal proceedings. The software supports scheduling, exhibits management, and compliance with legal standards to maintain case integrity. By eliminating the need for physical presence, it reduces costs and logistical challenges while expanding accessibility. Its secure environment protects sensitive information and provides tools for easy review and archiving of deposition records.
Pest Control Software
Pest control software allows pest control businesses to improve the efficiency of their operations by optimizing the management of customers, schedules, inventory and billing.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Parental Control Apps
Parental control apps are a type of software or app designed to help parents protect their children from malicious online content. Parental control apps offer a range of tools and filters, such as a website blocker, online time management and activity monitoring. These tools allow parents to limit their children's exposure to potentially harmful content on the internet, while also allowing them to observe their children's online behavior.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
IoT Device Management Software
IoT device management software helps businesses monitor, control, and maintain Internet of Things (IoT) devices within a network. These tools enable organizations to efficiently manage a wide array of IoT devices, from smart sensors and wearables to industrial machines, by providing features such as device provisioning, configuration, monitoring, diagnostics, and firmware updates. IoT device management software helps ensure the security, performance, and reliability of connected devices by tracking device health, detecting anomalies, and enforcing compliance with security policies. It is essential for businesses that rely on large numbers of IoT devices, particularly in industries such as manufacturing, healthcare, transportation, and smart cities.
AR Remote Collaboration Software
AR remote collaboration software enables remote teams to collaborate by utilizing augmented reality (AR) technology. AR remote collaboration software is useful for remote teams for training, collaboration, remote support, and more.
Remote Simultaneous Interpreting Platforms
Remote simultaneous interpreting (RSI) platforms, also known as live interpreting or real-time translation platforms, are solutions that allow interpreters to provide translation services from any location. These applications are powered by advanced artificial intelligence (AI) technology and natural language processing, providing instant written translations in real time. RSI platforms allow users to easily connect with professional interpreters across the globe, enabling seamless communication in various languages. The interpreters' work is monitored and recorded for quality assurance purposes, while the interpreter's equipment is always up-to-date with the latest technological advancements. All of these features combined create a secure, efficient way for people to communicate without language barriers.
Remote Visual Inspection Software
Remote visual inspection software enables businesses to conduct inspections of equipment, infrastructure, or products from a remote location using cameras, drones, or other visual technology. It allows inspectors to capture real-time video or images, share them with experts, and collaborate on analyzing potential issues without needing to be physically present. The software often includes features like high-definition imaging, annotation tools, and secure data storage to ensure accurate and efficient inspections. By reducing the need for travel and enabling faster assessments, remote visual inspection software improves efficiency, reduces costs, and enhances safety. Ultimately, it supports better decision-making by providing detailed visual insights, even in hard-to-reach or hazardous environments.
Remote Video Support Software
Remote video support software, also known as remote visual support software, enables customer service teams and technicians to provide technical support and assistance through real-time video calls. It allows users to troubleshoot issues, demonstrate solutions, and offer guidance by visually interacting with their devices. The software often integrates with existing customer relationship management (CRM) systems to track and manage interactions. It can be used across various industries, such as tech support, healthcare, and field services, improving efficiency and reducing downtime. With features like screen sharing, annotation tools, and session recording, remote video support enhances communication and problem resolution remotely.
Secure Remote Access Software
Secure remote access software provides users with secure access to computer networks, systems, and databases from an external location.
View more categories (20) for "ir remote control manager"

135 Products for "ir remote control manager" with 1 filter applied:

  • 1
    Venn

    Venn

    Venn

    Venn is the leader in BYOD Security. Venn’s Blue Border™ is patented technology that protects company data and applications on BYOD computers used by contractors and remote employees - without VDI. With Venn, work lives in a company-controlled Secure Enclave (installed on the user’s PC or Mac) where all data is encrypted and access is managed. Work applications run locally within the Enclave (no hosting or virtualization) and are protected and isolated from any personal use on the same computer. ...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 2
    Securden Endpoint Privilege Manager
    Securden Endpoint Privilege Manager (EPM) helps enterprises remove admin rights without impacting productivity on Windows, Mac, and Linux endpoints. Securden EPM helps elevate applications for standard users and grant admin rights on a Just-in-Time basis, eliminating standing privileges while maintaining seamless operations. Enforce application control using allowlisting and blocklisting, enable on-demand and policy-based granular application elevation, and manage privileges even on offline endpoints. ...
    View Software
    Visit Website
  • 3
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business...
    Leader badge
    Starting Price: $6/user/month
    Partner badge
    View Software
    Visit Website
  • 4
    ManageEngine Access Manager Plus
    ...But providing remote privileged users with such access presents huge security and privacy challenges, and legacy solutions like VPNs are often inflexible and simply don't cut it anymore. What modern enterprises need is a solution that enables direct access to every component in the infrastructure spread across the public and private clouds, while ensuring granular access controls, monitoring and recording all actions, and providing real-time control over every privileged session. ...
    Starting Price: $495 per year
  • 5
    ManageEngine Endpoint Central
    ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers...
    Leader badge
    Starting Price: $795.00/one-time
  • 6
    Reflectiz

    Reflectiz

    Reflectiz

    Reflectiz is a web exposure management platform that helps organizations identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. It provides full visibility and control over first, third, and fourth-party components like scripts, trackers, and open-source libraries that traditional security tools often miss. Operating remotely without embedding code, Reflectiz ensures no impact on site performance, no access to sensitive user data, and no additional attack surface. ...
    Starting Price: $5000/year
  • 7
    Kerio Control

    Kerio Control

    GFI Software

    Detect threats, block viruses and secure VPN with the firewall built for SMB. Configure your firewall with easy-to-use traffic rules, controlling in- and outbound communications by URL, application, traffic type and more. Intrusion detection and prevention using the Snort system constantly monitors inbound and outbound network communications for suspicious activity. Log or block the communications depending on the severity. Prevent viruses, worms, Trojans and spyware from entering your...
    Starting Price: $270 per year
  • 8
    Encyro

    Encyro

    Encryo Inc

    ...Encrypted Messaging and File Sharing You can directly send to any email address and Encyro automatically keeps your data secure both during transmission and storage to let you comply with HIPAA, GLB, IRS, GDPR, FINRA, SOX and other compliance standards. You can receive securely via your custom branded upload page that does not require the client to login or jump through hoops. Electronic Signatures Encyro e-signatures are designed to keep your transaction secure during remote signing. You control the login options and the type of signature to ensure that the right person is signing. ...
    Starting Price: $9.99/month/user
  • 9
    Ivanti Endpoint Security for Endpoint Manager
    ...Automated patch management covers Windows, macOS, Linux, and third-party applications across on-site, remote, and offline devices, ensuring systems stay up to date without impacting users. When malware or ransomware does get through, the solution’s auto-isolation and remote-control capabilities contain infections instantly, kill malicious processes, notify connected machines, and remediate or reimage compromised endpoints.
  • 10
    System Frontier
    PowerShell web front end with role based access control, auditing and remote management tools. Delegate granular permissions to manage servers, workstations, network devices and user accounts. Privileged Access Management (PAM). Let System Frontier do all the heavy lifting so you can focus on your enabling your IT teams to get more done without having more permissions than needed.
    Starting Price: $5
  • 11
    Securden Password Vault for Enterprises
    Securden Password Vault for Enterprises is a scalable, enterprise-grade credential management solution available in both cloud (SaaS) and on-premise deployments. It centralizes the storage of passwords, SSH keys, DevOps secrets, files, and other sensitive data in an AES-256 encrypted vault, helping organizations enforce strong security controls and defend against insider and external threats. The solution enables secure credential storage, granular access controls, automated password rotation, and just-in-time access while providing full visibility through audit logs, session recordings, and real-time alerts. ...
  • 12
    Securden Unified PAM
    ...The major modules of Securden Unified PAM are password management, privileged account management, secure remote access, application control, endpoint privilege management, privileged session management, and SSH key management. The platform supports compliance with NIS2, DORA, NIST, PCI-DSS, HIPAA, and ISO-IEC 27001. Installation typically takes only a few minutes, and a complete production-ready PAM can be achieved in less than a month with Securden Unified PAM.
    Starting Price: Per User Pricing
  • 13
    Ivanti Endpoint Manager
    ...Experience UEM today. Discover, inventory, and configure all devices—PCs, laptops, servers, tablets, and smartphones. Also remote control Windows and Mac devices.
  • 14
    VMware Live Recovery
    Secure cyber and site recovery at scale with a unified management experience across on-premises and public clouds Protect and recover VMs across on-premise and public clouds with fully automated orchestration at scale and a unified management experience. Confident, fast recovery from modern ransomware with live behavioral analysis of powered-on workloads in an on-demand isolated recovery environment (IRE).
  • 15
    ManageEngine Password Manager Pro
    ...Providing preventive & detective security controls through approval workflows & real-time alerts on password access. Meeting security audits and regulatory compliance such as SOX, HIPAA and PCI. Video record & audit all privileged access, and get a complete record of all actions. Control access to IT resources and applications based on roles and job responsibilities. Launch direct connection to remote IT resources, websites and applications.
    Starting Price: $495 per year
  • 16
    Uniqkey

    Uniqkey

    Uniqkey

    Uniqkey: Protect every login. Access with confidence. Uniqkey is Europe’s trusted password and access management platform - purpose-built for companies that demand security, simplicity, and control. Engineered by European cybersecurity experts, our platform combines military-grade encryption with an effortless user experience. We remove complexity from everyday workflows, helping employees stay secure without slowing them down. From auto-filling 2FA codes to streamlining access across...
    Starting Price: €4.5 per employee, per month
  • 17
    AirDroid Business
    ...AirDroid Business MDM Solution Highlights: *Multiple enrollment options: Zero-Touch Enrollment, AE Enrollment, Enroll with Device Owner, Regular Enrollment *Google Play apps management *Unattended remote access *Batch operations *Kiosk mode & Policy *Remote control with Black Screen security mode *Location tracking *Application management service(AMS) *Whitelisting and blocklisting browsers & apps *Remote monitor devices’ status *Real-time alerts & notifications
    Leader badge
    Starting Price: $12 /device/year
  • 18
    Aranda Device Management
    Aranda Device Management (ADM) is an IT asset management software that automates the management and configuration of computers, laptops, and servers, reducing operating costs and maximizing investment value. It enables full control of IT assets, increases resource efficiency, and optimizes return on investment. ADM allows for the management of up-to-date hardware and software inventories, execution of remote monitoring and control tasks, distribution and maintenance of software updates on devices, reduction of power consumption at workstations, and management of software licensing and usage within an organization. ...
  • 19
    LogMeIn Pro
    LogMeIn Pro is a reliable remote access software that enables individuals and small businesses to connect to their PCs or Macs from anywhere. It offers fast, secure remote control, allowing users to work as if they were physically at their computers. The platform supports unlimited users, file transfer between devices, remote printing, and multi-monitor display for enhanced productivity. LogMeIn Pro also includes antivirus protection powered by Bitdefender to safeguard devices from malware...
    Starting Price: $30 per month
  • 20
    BeachheadSecure

    BeachheadSecure

    Beachhead Solutions

    ...Security begins with encryption. BeachheadSecure provides a straightforward and intuitive cloud-based approach to deploying and managing multi-layered encryption across customers’ devices. Encryption alone will not protect remote data if access credentials are compromised. Then what? BeachheadSecure delivers instant remote data access control, with data access removal or restoration enabled with one click from the console.
    Starting Price: $36.00/year
  • 21
    Syncro

    Syncro

    Syncro

    Syncro offers the first Extended Monitoring and Management (XMM) platform purpose-built for midsized MSPs and internal IT teams. The unified platform integrates RMM (endpoint management), professional services automation (PSA), and Microsoft 365 multi-tenant management to help organizations simplify operations, strengthen security, and scale profitably. Syncro delivers powerful automation, native AI capabilities, deep Microsoft 365 integration, and seamless support for 50+ third-party...
    Leader badge
    Starting Price: $129 per user per month
  • 22
    SlashNext

    SlashNext

    SlashNext

    SlashNext anti-phishing and IR solutions stop threats across mobile, email, and web—dramatically reducing the risk of data theft, cyber extortion, and breaches. Protect iOS and Android users from mobile-centric phishing threats with a lightweight, cloud-powered agent. Shield employees from live phishing sites with cloud-powered browser extensions for all major desktop browsers. Use live threat intelligence to turn existing network security controls into a real-time, multi-vector phishing...
  • 23
    Cisco Secure Equipment Access
    Secure remote access to your ICS and OT assets, and easily enforce cybersecurity controls at scale with our zero-trust network access solution made for industrial networks and harsh environments. Securing remote access to operational technology assets has never been easier, or more scalable. Operate with better efficiency and get peace of mind with Cisco Secure Equipment Access. Empower your operations team, contractors, and OEMs to remotely maintain and troubleshoot ICS and OT assets with...
  • 24
    Hyperport

    Hyperport

    Hyperport

    The Hyperport is a unified secure-user-access solution that merges Zero-Trust Network Access (ZTNA), Privileged Access Management (PAM), and Secure Remote Access (SRA) into one flexible architecture, allowing internal staff, remote employees, vendors and third-party partners to connect in seconds without compromising security. It enforces least-privilege access across an organisation’s entire infrastructure, from Windows and web applications to industrial control systems, via just-in-time authorization, multi-factor authentication at every security zone, real-time monitoring, session recording, and dynamic entitlement management. ...
  • 25
    Devolutions Server
    ...DVLS also includes optional privileged access components for organizations that require more granular control over sensitive accounts. Fully integrated with Remote Desktop Manager, it offers a seamless way to manage credentials and remote sessions, ensuring that all access is secure and well-governed. Whether you’re a small team or a large enterprise, Devolutions Server simplifies credential management and improves security.
    Starting Price: $3/month/user
  • 26
    Claroty

    Claroty

    Claroty

    Powered by our Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, our platform provides a full range of industrial cybersecurity controls that integrate seamlessly with your existing infrastructure, scale effortlessly, and have the industry's lowest total cost of ownership (TCO). The comprehensive industrial cybersecurity controls our platform provides revolve around the REVEAL, PROTECT, DETECT, CONNECT framework. Our platform's features empower you to achieve...
  • 27
    BeyondTrust Privileged Remote Access
    ...Prevent “privilege creep” and quickly enforce least privilege to protect your IT assets. Make least privilege productive and combat data breaches, without sacrificing security. Standardized, secure, and complete privileged session management solution that controls the access to and from any platform in any environment. Eliminate manual credential check-in and check-out.
  • 28
    Dispel

    Dispel

    Dispel

    The industry's fastest remote access system that exceeds cybersecurity standards. Remote access is useful only if your team chooses to use it. That means it must be more than a security spec sheet. It must be fast, intuitive, and yes, look good. A person on a company's warehouse tablet selects the system they need to reach. Device and protocol whitelisting are hidden from view. The intense escalation of demand under COVID broke the administrative processes underlying most remote access...
  • 29
    MetaAccess
    Security teams face challenges with increasing work-from-home scenarios, and lack visibility and control over what devices are accessing their network and if they're secure. Adding to the complexity is the myriad point products generally needed to gain this visibility and control. MetaAccess is one solution giving your organization secure network access and deep endpoint compliance. With this one platform approach, you can greatly simplify ongoing management, reducing time, effort and most importantly, risk. ...
  • 30
    Avast Secure Private Access
    Users dislike VPNs due to the constant login requirements every time application access is needed. They grow frustrated with its latency when working remotely and often attempt to bypass security controls altogether to get work done. A VPN extends the corporate network to the remote user, broadening the attack surface and increasing breach risk. If a remote employee’s device becomes infected with malware, it can infect the whole network when the user VPNs in. A full VPN gateway appliance stack is expensive and requires significant resources to manage.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB