 |
IT Management
DeskGate provides fast and secure management of computers located in remote locations.
|
 |
Protect your valuable data
Process tracking, event analysis and retrospective reporting due to processes being recorded.
|
 |
Secure remote access
With the DeskGate remote connection feature, you can also provide fast and secure support to non-customer users.
|
 |
Create a Remote Support service
If you provide customer or support services, you can create a support service on demand and customers can ask you for help. |
 |
Strong analysis reports
You can access support history, inventory information, installed programs, usage times, visited websites, copied files and many other special reports within your license.
|
 |
Inventory report
You can access inventory information (many features such as Device Features, Installed Software and Serial Numbers) and extract summary reports.
|
 |
Video recording
You can keep ahead of user complaints by keeping tabs through video surveillance or you can record all activities the support team has done on your servers.
|
 |
Restriction & Prohibition
You can block access to websites that you do not want users go to during office hours, or you can just create a list of allowed websites. |
 |
File transfer & sharing
It is very easy to send secure files to your company or remote offices. Send or receive files quickly and securely.
|
 |
Chat
When you want to talk about something private with a staff member, you can do it through starting an instant message.
|
 |
Setup
Prepare your own installation file via your user panel and install it quickly.
|
 |
Groups and Permissions
You can define custom groups, and these definitions can give you administrator-specific privileges.
|
 |
URL Registrations
Record and take note of all visited websites in detail.
|
 |
Performance
It records user login and log out times as well as active or passive statuses in real time, so you can get detailed reports about your work processes.
|
 |
Program duration
Be aware of what programs users use most during the day.
|
 |
Program restriction
Prevent user errors by blocking software that you do not want them to use or install.
|
 |
Copied word processing
Create extensive records of what is copied and pasted during the copy-and-paste process.
|
 |
Written articles
Access extensive records of what users write and in which programs.
|
 |
USB and Memory device processes
Record all processes made with portable devices such as USB and Memory devices.
|
 |
USB and Memory device blocking
Block portable devices such as USB or Memory, or give special permissions to the serial numbers you specify.
|
 |
Hardware Inventory
Record many hardware devices such as CPU, RAM, HDD.
|
 |
Software Inventory
Find information about installed software products and necessary parameters for uninstalling them.
|
 |
Fix report
Create a detailed report of important hardware and software products .
|
 |
Administrator processes
Record and analyze in detail the processes that managers have made.
|
 |
Multi-screen monitoring
With multi-screen monitoring, you can instantly monitor multiple users' screens instantly and quickly intervene.
|
 |
Network traffic
Create a report with information of actual network traffic measured by software port as well as the software being used.
|
 |
Command
Run custom commands remotely from your site quickly, without losing time.
|
 |
File processes
Record important actions such as deleting, creating, and changing files.
|
 |
User processes
Record all active processes made by the user and create a retrospective report.
|
 |
Alert system
When you want to know or when you want to be notified of an event, be alerted instantly by making special definitions within the warning system.
|
 |
Printscreen
Turn off user screen capture.
|
 |
Backup
Take security precautions against bad scenarios by automatically backing up user-specific files.
|
 |
Remote locations
Whether you want to remotely manage locations or you want to manage multiple locations as if they were a single network configuration, you can also work offline with central localization.
|
 |
Local network
Use secure environments without turning on your local network in places of high security.
|
|
|
|
|