Compare the features between our Free and Team Editions of Remote Desktop Manager.
Donnez-nous vos commentaires
|Directly inject credentials into end servers, systems, applications and websites using our Workspace browser extension.
|Generate exhaustive access logs to keep track of privileged user activity.
|Capture all events surrounding privileged account operations, including login attempts and history.
|Automated typing macro on connect or disconnect.
|Automatically launch connections using a single-click
|Launch connections to privileged sessions, remote servers, virtual machines, websites and applications with a single-click using credentials injection.
|Centralize your connections
|Operate efficiently and securely in a multi-user environment by easily sharing sessions with colleagues and other team members using multiple data sources.
|Centralized password vault
|Protects all your privileged accounts in a centralized vault using US federal government approved encryption.
|Optional connection warning for already connected users.
|Securely stores all your PDF, Word, Excel, Visio and image documents directly in the database for easy sharing.
|Database double encryption with personalized passphrase or certificate.
|All passwords are encrypted by default.
|Export your report as a CSV file or execute and export your report through a command line.
|Export sessions and entries
|Easily export information in an XML file.
|Failed login report
|Generate exhaustive report of failed login attempts and history.
|Import from other applications and from different sources
|Import sessions from other applications like Dameware, KeePass, RDCMan and more; import information from a CSV file or directly from Active Directory.
|Directly imports credentials from other applications, including 1Password, Aurora Password Manager, Dashlane, DataVault, EnPass, Google Chrome, KeePass, LastPass, Passpack, Password Agent, Password Depot, Password Safe, RoboForm, SplashID, Sticky Password.
|Integrated cloud consoles
|Offers integrated cloud consoles, such as, Microsoft Azure and Microsoft Azure Table Storage.
|Integrated management tools
|Built-in support of Intel AMT out-of-band management capabilities.
|Integrated user vault
|Allows each user to have their own user vault.
|Integrated virtualization consoles
|Offers a quick overview of a machine's state using integrated virtualization consoles, such as Hyper-V, Terminal Server, Citrix XenServer and VMware.
|Integrated VPN and VPN Management
|Integrated VPN connection management with Microsoft, Cisco, SonicWall and IPsecVPN; also supports VPN route management.
|Integrates with different connection types and add-ons
|Integrates with the most popular protocols and remote connection types as well as more than 60 add-ons.
|Integrates with existing password managers
|Integrates with 1Password, AuthAnvil, Dashlane, KeePass, LastPass and more.
|Macro support and automated macro
|Supports custom variables (host, username, domain, password) and Windows environment variables; also supports automated typing macro on connect or disconnect.
|Macro/Script tool support
|Supports any command line tool, keyboard macros, PowerShell, WASP PowerShell and more.
|Retrieve passwords and approve requests wherever you are using your smartphone.
|Vaults allow a database to be divided into multiple, smaller compartments, making it easy to manage massive numbers of entries without experiencing reduced performance.
|Multiuser data sources
|Integrates with different multiuser data source types, including: Devolutions Server, Microsoft Azure SQL, and Microsoft SQL Server.
|Access your database even when there is no Internet connectivity.
|Password generator and integrated password management tools
|Generates strong and random passwords, and also has an integrated password analyser and produces password history reports.
|Set your password on a parent folder for the children folders to inherit it. The latter enables entries to inherit credentials from a parent folder.
|Password usage audit trail
|Clear view of password access and audit traces.
|Modify or import entries with PowerShell; open any connection directly from a script.
|Real-time connection status
|Provide a clear view of which users are currently connected to servers within the same repository.
|Reduce the time it takes to manage users by granting selective permissions to multiple users at once.
|Role-based access control
|The role-based based access control enables the creation of a granular protection system, giving the flexibility to manage more permissions.
|Securely store sensitive information
|Stores all your sensitive information -- bank account, email, passport, credit card, alarm codes -- in a highly-secure and centralized vault.
|Export and import your data source configurations to simplify deployment for multiple users.
|Adds an additional layer of protection to your data source, using a two-factor authentication like Duo, Google Authenticator, Yubikey and AuthAnvil.
|Integrated user groups management mapped to the Active Directory Groups with the combination of Devolutions Server.
|Keeps track of all modifications, allowing you to view the change history and easily roll back any unwanted change or deletion.
|Web browser integration
|The browser extension integrates with Internet Explorer, Firefox, Google Chrome and Opera.