YEAR DESKGATE YOU

Everything you need for security software


 
 

Features


DISCOVER YOUR IT MANAGEMENT POWER NOW


IT Management

DeskGate provides fast and secure management of computers located in remote locations.

Protect your valuable data

Process tracking, event analysis and retrospective reporting due to processes being recorded.

Secure remote access

With the DeskGate remote connection feature, you can also provide fast and secure support to non-customer users.

Create a Remote Support service

If you provide customer or support services, you can create a support service on demand and customers can ask you for help.

Strong analysis reports

You can access support history, inventory information, installed programs, usage times, visited websites, copied files and many other special reports within your license.

Inventory report

You can access inventory information (many features such as Device Features, Installed Software and Serial Numbers) and extract summary reports.

Video recording

You can keep ahead of user complaints by keeping tabs through video surveillance or you can record all activities the support team has done on your servers.

Restriction & Prohibition

You can block access to websites that you do not want users go to during office hours, or you can just create a list of allowed websites.

File transfer & sharing

It is very easy to send secure files to your company or remote offices. Send or receive files quickly and securely.

Chat

When you want to talk about something private with a staff member, you can do it through starting an instant message.

Setup

Prepare your own installation file via your user panel and install it quickly.

Groups and Permissions

You can define custom groups, and these definitions can give you administrator-specific privileges.

URL Registrations

Record and take note of all visited websites in detail.

Performance

It records user login and log out times as well as active or passive statuses in real time, so you can get detailed reports about your work processes.

Program duration

Be aware of what programs users use most during the day.

Program restriction

Prevent user errors by blocking software that you do not want them to use or install.

Copied word processing

Create extensive records of what is copied and pasted during the copy-and-paste process.

Written articles

Access extensive records of what users write and in which programs.

USB and Memory device processes

Record all processes made with portable devices such as USB and Memory devices.

USB and Memory device blocking

Block portable devices such as USB or Memory, or give special permissions to the serial numbers you specify.

Hardware Inventory

Record many hardware devices such as CPU, RAM, HDD.

Software Inventory

Find information about installed software products and necessary parameters for uninstalling them.

Fix report

Create a detailed report of important hardware and software products .

Administrator processes

Record and analyze in detail the processes that managers have made.

Multi-screen monitoring

With multi-screen monitoring, you can instantly monitor multiple users' screens instantly and quickly intervene.

Network traffic

Create a report with information of actual network traffic measured by software port as well as the software being used.

Command

Run custom commands remotely from your site quickly, without losing time.

File processes

Record important actions such as deleting, creating, and changing files.

User processes

Record all active processes made by the user and create a retrospective report.

Alert system

When you want to know or when you want to be notified of an event, be alerted instantly by making special definitions within the warning system.

Printscreen

Turn off user screen capture.

Backup

Take security precautions against bad scenarios by automatically backing up user-specific files.

Remote locations

Whether you want to remotely manage locations or you want to manage multiple locations as if they were a single network configuration, you can also work offline with central localization.

Local network

Use secure environments without turning on your local network in places of high security.