Top 8 Remote Access

Microsoft Remote Desktop ServicesTeamViewerCheck Point Remote Access VPNCitrix Virtual Apps and DesktopsBeyondTrust Privileged Remote AccessBeyondTrust Remote SupportConnectWise ControlISL Online
  1. leader badge
    Things can be made easier if someone is not with us or at a long distance since we can connect easily with those people. So, it's easy for us to use such features.
  2. leader badge
    The most valuable feature has been the ability to give control to others for support purposes.The most valuable features of TeamViewer are the ease of connecting to remote computers. I do not need a lot of information about their computers to connect, a nontechnical person can give me the information needed for me to connect. Additionally, the solution does not gather other system information about the host or client's systems as other solutions might, such as AnyDesk.
  3. Buyer's Guide
    Remote Access
    June 2023
    Find out what your peers are saying about Microsoft, TeamViewer, Check Point and others in Remote Access. Updated: June 2023.
    708,461 professionals have used our research since 2012.
  4. leader badge
    It is stable most of the time.It keeps us safe when browsing the internet and when sharing confidential information with our colleagues.
  5. leader badge
    It is a stable solution. We don't usually have problems with the platform...It is a very scalable solution.Citrix Virtual Apps and Desktops is a stable solution.
  6. It's a stable product. Based on the demos and interaction with it, it was stable.I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers.
  7. The support team who are interfacing with us, are excellent. They are on time for any response.We like that it records the remote sessions. If a technician is logged into a user remotely to fix any problem, it records the decision.
  8. report
    Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
    708,461 professionals have used our research since 2012.
  9. I've noted an ROI while using the solution. It's very low maintenance.
  10. The most valuable feature is safety.The code can be delivered in multiple ways, including an email with a link for an unattended connection.

Advice From The Community

Read answers to top Remote Access questions. 708,461 professionals have gotten help from our community of experts.
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager at PeerSpot (formerly IT Central Station)

Why do you recommend it?

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi, Personally, I used the below tools and solved the purpose: - Teamviewer… more »
2 Answers
Davina Becker - PeerSpot reviewer
Davina Becker
Content Editor

As offices have shifted to working to their home offices, which remote access solution have you found to be beneficial? 

What makes the solution you prefer to stand apart from the competition? E.g., did you try other vendors and what made you prefer your solution more?

Reviewer872712 - PeerSpot reviewer
Reviewer872712I spend a large percentage of my time remoting. My personal suggestion is to… more »
7 Answers

Remote Access Articles

Abhirup Sarkar - PeerSpot reviewer
Abhirup Sarkar
Director, Middle East, East India & SAARC at DMX Technologies
What started out with hiring the workforce from different parts of the world to cut overhead costs and develop remote and hybrid working teams has become increasingly common, thanks to the COVID-19 pandemic.  Working from different locations has become the norm and has changed the way business...
Read More »
Alex Vakulov - PeerSpot reviewer
Alex Vakulov
Editor at a tech company with 11-50 employees
In this article, I want to talk about the practical issues of implementing secure remote access as well as what is happening in the market, how regulators affect teleworking, and whether it is necessary to monitor employees who work from home. In the spring of last year, organizations operat...
Read More »

Remote Access Topics

What are the different types of remote access methods?

The most popular types of remote access control include:

  • Direct physical line: This is a direct line from a computer to an organization's LAN.

  • VPN (virtual private network): A VPN gives users a higher level of security by masking the IP address they are working from and granting access to a virtual private network that is more secure and can give access to the organization's proprietary data. A VPN provides an additional layer of security and will encrypt data traffic keeping information more secure. A VPN is generally part of an organization's LAN and is within the server architecture.

  • Cloud: This method is growing in popularity, as many workers have made the switch to working remotely. As many of today’s ecosystems are moving to cloud environments, it is a preferred option for today's organizations. A cloud environment can be public, private, or hybrid.

  • Windows Remote Desktop Services (RDS): This is a component of Windows that allows users to take control of a remote desktop computer or a virtual machine over a network connection.
What are the 4 components of remote access connection?
  • Remote access client: This refers to the actual devices that connect to the organization’s network. These can include desktops, laptops, and various types of mobile devices.

  • Remote access server: This is a destination point for all remote access connections.

  • Methods: As mentioned above, this can include, LAN, WAN, VPN, or RDS.
  • Access security: There are several different types of options available to keep an organization's network secure. They include, but are not limited to, Privileged Access Management (PAM), Firewalls, SSO, and MFA.
What is the difference between remote access and remote desktop?

Remote access grants direct access to the network. A remote desktop grants access to a desktop device that may have specific programs, files, or applications loaded onto the device. Additionally, the desktop may also access the entire network.

What are remote access tools?

Remote access tools (sometimes referred to as RATs) grant access to an organization's network, servers, drives, devices, and systems from a remote location. Although most are legitimate tools, there is the possibility some may be used for malicious purposes and can mislead an unaware user into installing malware, viruses, or dangerous bots and giving open access to their devices or networks.

Remote Access Tools Benefits
  • Cost-effective: Remote access tools give organizations the opportunity to run continuously for significantly less cost. They can help in reducing actual office costs, and equipment costs, to provide the ability to resolve technical issues faster.

  • Global workplace: Remote access tools allow the flexibility to have approved access anywhere, at any time, using any device. The organization has full control over how end users access the network. This gives greater control and fluidity to how employees and other users access the information they need when they need it.

  • Improved efficiency: Remote access tools improve the speed at which administrators and other tech personnel can respond to any situation quickly and efficiently. Tech specialists do not need to be on site and can for the most part make any changes or repairs to the network remotely. Additionally, as end users, (employees, students, clients, stakeholders, etc.) do not need to go to a physical location, most processes can be completed quickly and easily.
Remote Access Tools Features
  • User friendly: Many users who are accessing the network will not be tech-savvy experts. A remote access tool should be easy to use and simple to understand. Many end users may be logging in from very remote locations or after general business hours, and the entire access process should be very user-friendly. The easier and more simple it is to interact with the remote access control tool interface will greatly improve the overall productivity process and improve the end result.

  • Device recognition: Although it may be optimal to have complete access using any device, depending on the type of organization, it is a good idea to consider a remote access tool that will allow discretion as to the type of device that can be used to access the network. In certain circumstances, any device will do. However, in other situations, such as a particular location or using a particular device, it may not be in the best interest of the organization to allow access. A good remote access tool will give administrators control to decide how the network should be accessed.

  • High level of security: Any type of remote access possesses some amount of risk. A robust, secure remote access tool will provide various levels of security, granting administrators control over who can access which parts of the network, from what location they can access it, and which device users can use to gain access.

  • Reporting: The tool will provide thorough reporting and analytics. Such topics will include: who is accessing the network, how users are accessing the network. which programs or applications they are accessing, when they are accessing and from which location, what type of devices are being used, etc. The analytics and reports can ensure that access to the network is only for the appropriate purpose and that no inappropriate or suspicious activity is taking place.
  • No client-side responsibility: The remote access tool will keep all control and responsibility within the organization. There will be nothing for the end user to download or install. This keeps the end user happy and feeling secure; they do not have to tax their personal resources unnecessarily. It will also ensure that control and security remains within the organization and it will help to maintain the overall health, security, and safety of the network ecosystem.
Buyer's Guide
Remote Access
June 2023
Find out what your peers are saying about Microsoft, TeamViewer, Check Point and others in Remote Access. Updated: June 2023.
708,461 professionals have used our research since 2012.