Coming October 25: PeerSpot Awards will be announced! Learn more

Top 8 Remote Access

Citrix Virtual Apps and DesktopsTeamViewerMicrosoft Remote Desktop ServicesCheck Point Remote Access VPNBeyondTrust Privileged Remote AccessConnectWise ControlISL OnlineBeyondTrust Remote Support
  1. leader badge
    Citrix is used by many organizations to make it possible to streamline the way different developers work together from different locations.The remote desktop feature allows employees to work from home.
  2. leader badge
    The most valuable feature has been the ability to give control to others for support purposes.The most valuable features of TeamViewer are the ease of connecting to remote computers. I do not need a lot of information about their computers to connect, a nontechnical person can give me the information needed for me to connect. Additionally, the solution does not gather other system information about the host or client's systems as other solutions might, such as AnyDesk.
  3. Buyer's Guide
    Remote Access
    September 2022
    Find out what your peers are saying about Citrix, TeamViewer, Microsoft and others in Remote Access. Updated: September 2022.
    633,572 professionals have used our research since 2012.
  4. leader badge
    The solution is stable and reliable. The product is stable.
  5. leader badge
    Thanks to all these security processes, our users can access our infrastructure with the certainty that we will not be compromised.The most important feature of Check Point Remote Access VPN is the multiple factor authentication.
  6. PRA stands on its own as a full solution. This is important because it reduces the need to maintain a lot of different services. Also, the integration between those services are sometimes not easy to maintain. So, having a solution like BeyondTrust Privileged Remote Access reducing our workload gives us enough time to work on our other issues. The system just runs and does what it is supposed to do.
  7. Control lets us do remote management of machines without having to be on the VPN. It's super simple and super easy.ConnectWise Connect is very convenient as we can remote to a PC even when it is not within our LAN.
  8. report
    Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
    633,572 professionals have used our research since 2012.
  9. The code can be delivered in multiple ways, including an email with a link for an unattended connection. We can also monitor our systems at any time from practically anywhere.
  10. I like Remote Support's ability to connect to a system without end-user interaction. A support engineer can log in to the system if a user is stuck and doesn't know where to go. This is helpful when conference room computers get locked down and the user can't access the guest OS.

Advice From The Community

Read answers to top Remote Access questions. 633,572 professionals have gotten help from our community of experts.
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Jun 09 2022

Why do you recommend it?

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi, Personally, I used the below tools and solved the purpose: - Teamviewer… more »
2 Answers
Davina Becker - PeerSpot reviewer
Davina Becker
Content Editor
PeerSpot

As offices have shifted to working to their home offices, which remote access solution have you found to be beneficial? 

What makes the solution you prefer to stand apart from the competition? E.g., did you try other vendors and what made you prefer your solution more?

Reviewer872712 - PeerSpot reviewer
Reviewer872712I spend a large percentage of my time remoting. My personal suggestion is to… more »
7 Answers

Remote Access Articles

Abhirup Sarkar - PeerSpot reviewer
Abhirup Sarkar
Director, Middle East, East India & SAARC at a tech company with 51-200 employees
What started out with hiring the workforce from different parts of the world to cut overhead costs and develop remote and hybrid working teams has become increasingly common, thanks to the COVID-19 pandemic.  Working from different locations has become the norm and has changed the way business...
Read More »
Alex Vakulov - PeerSpot reviewer
Alex Vakulov
Editor at a tech company with 11-50 employees
In this article, I want to talk about the practical issues of implementing secure remote access as well as what is happening in the market, how regulators affect teleworking, and whether it is necessary to monitor employees who work from home. In the spring of last year, organizations operat...
Read More »

Remote Access Topics

What are the different types of remote access methods?

The most popular types of remote access control include:

  • Direct physical line: This is a direct line from a computer to an organization's LAN.

  • VPN (virtual private network): A VPN gives users a higher level of security by masking the IP address they are working from and granting access to a virtual private network that is more secure and can give access to the organization's proprietary data. A VPN provides an additional layer of security and will encrypt data traffic keeping information more secure. A VPN is generally part of an organization's LAN and is within the server architecture.

  • Cloud: This method is growing in popularity, as many workers have made the switch to working remotely. As many of today’s ecosystems are moving to cloud environments, it is a preferred option for today's organizations. A cloud environment can be public, private, or hybrid.

  • Windows Remote Desktop Services (RDS): This is a component of Windows that allows users to take control of a remote desktop computer or a virtual machine over a network connection.
What are the 4 components of remote access connection?
  • Remote access client: This refers to the actual devices that connect to the organization’s network. These can include desktops, laptops, and various types of mobile devices.

  • Remote access server: This is a destination point for all remote access connections.

  • Methods: As mentioned above, this can include, LAN, WAN, VPN, or RDS.
  • Access security: There are several different types of options available to keep an organization's network secure. They include, but are not limited to, Privileged Access Management (PAM), Firewalls, SSO, and MFA.
What is the difference between remote access and remote desktop?

Remote access grants direct access to the network. A remote desktop grants access to a desktop device that may have specific programs, files, or applications loaded onto the device. Additionally, the desktop may also access the entire network.

What are remote access tools?

Remote access tools (sometimes referred to as RATs) grant access to an organization's network, servers, drives, devices, and systems from a remote location. Although most are legitimate tools, there is the possibility some may be used for malicious purposes and can mislead an unaware user into installing malware, viruses, or dangerous bots and giving open access to their devices or networks.

Remote Access Tools Benefits
  • Cost-effective: Remote access tools give organizations the opportunity to run continuously for significantly less cost. They can help in reducing actual office costs, and equipment costs, to provide the ability to resolve technical issues faster.

  • Global workplace: Remote access tools allow the flexibility to have approved access anywhere, at any time, using any device. The organization has full control over how end users access the network. This gives greater control and fluidity to how employees and other users access the information they need when they need it.

  • Improved efficiency: Remote access tools improve the speed at which administrators and other tech personnel can respond to any situation quickly and efficiently. Tech specialists do not need to be on site and can for the most part make any changes or repairs to the network remotely. Additionally, as end users, (employees, students, clients, stakeholders, etc.) do not need to go to a physical location, most processes can be completed quickly and easily.
Remote Access Tools Features
  • User friendly: Many users who are accessing the network will not be tech-savvy experts. A remote access tool should be easy to use and simple to understand. Many end users may be logging in from very remote locations or after general business hours, and the entire access process should be very user-friendly. The easier and more simple it is to interact with the remote access control tool interface will greatly improve the overall productivity process and improve the end result.

  • Device recognition: Although it may be optimal to have complete access using any device, depending on the type of organization, it is a good idea to consider a remote access tool that will allow discretion as to the type of device that can be used to access the network. In certain circumstances, any device will do. However, in other situations, such as a particular location or using a particular device, it may not be in the best interest of the organization to allow access. A good remote access tool will give administrators control to decide how the network should be accessed.

  • High level of security: Any type of remote access possesses some amount of risk. A robust, secure remote access tool will provide various levels of security, granting administrators control over who can access which parts of the network, from what location they can access it, and which device users can use to gain access.

  • Reporting: The tool will provide thorough reporting and analytics. Such topics will include: who is accessing the network, how users are accessing the network. which programs or applications they are accessing, when they are accessing and from which location, what type of devices are being used, etc. The analytics and reports can ensure that access to the network is only for the appropriate purpose and that no inappropriate or suspicious activity is taking place.
  • No client-side responsibility: The remote access tool will keep all control and responsibility within the organization. There will be nothing for the end user to download or install. This keeps the end user happy and feeling secure; they do not have to tax their personal resources unnecessarily. It will also ensure that control and security remains within the organization and it will help to maintain the overall health, security, and safety of the network ecosystem.
Buyer's Guide
Remote Access
September 2022
Find out what your peers are saying about Citrix, TeamViewer, Microsoft and others in Remote Access. Updated: September 2022.
633,572 professionals have used our research since 2012.