Keeper

Keeper

Creators of the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. The Keeper leadership team is committed to customer success. We have deep expertise in cybersecurity software, cloud computing and mobile device technologies.

Keeper

Cybersecurity starts with password security. Keeper is the top-rated password manager for protecting you, your family and your business from password-related data breaches and cyberthreats.

Keeper manages your passwords to prevent data breaches, improve employee productivity, cut helpdesk costs and meet compliance standards.

Best-in-Class Security
Keeper uses a proprietary zero-knowledge security architecture and is the most audited and certified product on the market. Keeper protects your business and client data with the privacy, security and confidentiality requirements of your industry.

Ease of Use
Keeper has an intuitive user interface for computers, smartphones and tablets that can be deployed rapidly with no upfront equipment or installation costs.

Ultimate Flexibility
Keeper’s configurable roles, role-based permissions and admin privileges align with your organizational structure and policies. Keeper scales for businesses of all sizes.

Mitigates Risk of Data Breaches
Keeper creates random, high-strength passwords for all your websites and applications then stores them in a secure vault on all your devices.

Bolsters Password Security and Privacy
Each employee gets a private, encrypted vault for storing and managing their passwords, credentials, files and private client data.

Boosts Employee Productivity
Saves employees time, frustration and eliminates the need for them to reset, reuse and remember passwords.

Strengthens Compliance Standards
Supports role-based controls, 2FA, auditing, event reporting and industry compliance with HIPAA, DPA, FINRA, GDPR and more.

Open/Close all the descriptions

Keeper Business

Secure business passwords to prevent data breaches, improve employee productivity and meet compliance standards

  • Encrypted vault for every user
  • Folders and subfolders
  • Shared team folders
  • Access from unlimited devices
  • Policy engine and enforcements
  • Security Audit
  • Activity reporting
  • Team management
  • Basic Two-Factor Authentication (SMS, TOTP, smartwatch and FIDO U2F)

Open/Close all the descriptions

Keeper Enterprise

Keeper Enterprise Password Manager supports large and complex enterprise deployments.
Keeper can be deployed at enterprise scale with advanced features including automated user provisioning, Active Directory sync, Single Sign-On (SAML 2.0) authentication, SCIM and developer APIs. Keeper maps your corporate structure using hierarchical organizational units and delegated administration.

  • Everything in Keeper Business, plus:
  • Single Sign-On (SAML 2.0) authentication
  • Automated Team Management
  • Advanced Two-Factor Authentication (DUO & RSA)
  • Active Directory and LDAP sync
  • SCIM and Azure AD provisioning
  • Email auto-provisioning
  • Command line provisioning
  • Developer APIs for password rotation and backend integration

Open/Close all the descriptions

BrachWatch add-on

It is essential that you know when one of your passwords has been subject to a data breach. BreachWatch monitors the dark web for breached accounts and alerts you so you can take action to protect your online identity. BreachWatch is fully integrated with your Keeper Password Manager.

Lansweeper

Lansweeper

Lansweeper originated in Belgium in the mid 2000s Lansweeper SA designs and develops application software. The Company offers a security platform that provides IP range scanning, network and IT asset management, license compliance audits, and automated software deployment solutions. Lansweeper serves customers worldwide

IT Asset Management Software That Finds & Manages All Assets Across Your Enterprise. Track Hardware, Software, and Users. Agentless Network Discovery.

Open/Close all the descriptions

Cross-Platform IT Asset Discovery

Discover all IT assets in your network without having to install any software on your machines. Lansweeper finds & gathers information on all assets, listing hardware specs, installed software, user details, and much more. Eliminate one of the biggest hurdles in IT, getting complete end-to-end visibility of your network, and save valuable time and resources.

Create a complete and up-to-date inventory thanks with Lansweeper’s Network Discovery. Scan Windows, Linux, and MAC devices. Find and organize printers, routers and switches and track assets not yet deployed or disconnected from your network. Discover SNMP-enabled devices on your network to create a detailed network inventory.

Open/Close all the descriptions

One Centralized IT Inventory

All your Hardware, Software, and Users, all in one place. Lansweeper consolidates all asset details in a centralized web-based, System of Record. It offers corporations complete visibility into their distributed IT environments, informing them which assets they own, where they are located, who is using them, and much more. Clicking on an individual asset record lets you see all the granular information Lansweeper has collected.

Hardware Inventory

Build a comprehensive hardware inventory from scratch. Lansweeper scans your entire network to collect information about computers and their hardware components.

Software Inventory

Automatically scan software on Windows, Linux and Mac devices, and get a complete software inventory and license audit of your IT environment.

User Inventory

Manage a complete inventory of users in your IT estate. Get a complete overview of local users, AD users, and assets they are related to.

Open/Close all the descriptions

Get Answers Through Analytics

Get the answers you need in no time. Need a quick overview on all the printers in the office or serial numbers of all your PCs? Need a run-down of all new devices that were found in the last 24 hours? Choose from over 400 ready-made, out of the box network reports or build custom reports within minutes.

Okta

Okta

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 6000 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,600 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to securely connect their people and technology.

The Okta Identity Cloud provides secure identity management with Single Sign-On, Multi-factor Authentication, Lifecycle Management (Provisioning), and more.

  • Single Sign-on: Reliable integration for SSO to all your web and mobile apps, with a full-featured federation engine and flexible access policy.
  • Adaptive Muti-factor Authenthication: app mobile, SMS/Voice/Email OTP, Software OTP. Okta supports a variety of native and 3rd party authentication factors.
  • Universal Directory: One place to manage all your users, groups and devices, mastered in Okta or from any number of sources.
  • Lifecycle Management:. Automate all lifecycles with any business process for external and internal users
  • API Access Management: Your custom apps are increasingly modern with an API backend. Secure enterprise data and enable developers to focus on the user experience.
  • Advanced Server Access: Zero Trust access management for infrastructure that just works. Extend core Okta Identity & Access to your Linux and Windows servers via SSH & RDP in an elegant manner built for the modern cloud.

 

Netwrix

Netwrix

Netwrix Corporation is a software company focused exclusively on providing IT security and operations teams with pervasive visibility into user behavior, system configurations and data sensitivity across hybrid IT infrastructures to protect data regardless of its location. Over 10,000 organizations worldwide rely on Netwrix to detect and proactively mitigate data security threats, pass compliance audits with less effort and expense, and increase the productivity of their IT teams.

Founded in 2006, Netwrix has earned more than 140 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.

Open/Close all the descriptions

Netwrix auditor - it is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments

Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage.

Netwrix Auditor delivers visibility and control across the broadest variety of on-premises and cloud-based IT systems in a unified way. Coupled with our cross-system reporting, this broad coverage provides a single pane of glass for understanding what’s going on across your entire hybrid cloud IT infrastructure.

Detect Data Security Threats – On Premises and in the Cloud
Delivers security intelligence about critical changes, configurations and data access and enables investigation of suspicious user behavior before data is compromised.

Pass Compliance Audits with Less Effort and Expense
Provides the evidence required to prove that your organization’s IT security program adheres to PCI DSS, HIPAA, SOX, ISO/IEC 27001, GDPR and other standards.

Increase the Productivity of Security and Operations Teams
Relieves IT departments of manual crawling through log data to get the information about who changed what, when and where a change was made, or who has access to what.

Snow Software

Snow Software

Snow Software is the largest dedicated developer of Software Asset Management (SAM) solutions, designed to ensure that the hundreds of billions spent on enterprise software is money well spent – ensuring organizations have the appropriate licenses for the software they use – not too many, not too few.

With more local offices and regional support centers than any other SAM solutions provider, more than 4,500 organizations around the world rely on Snow Software’s on-premise and cloud-based SAM solutions to manage software licensing across more than 11 million devices, from mobile to desktop, datacenter to the cloud.

Open/Close all the descriptions

Snow License Manager - The world’s leading Software Asset Management solution for software, SaaS and IaaS, with cloud & on-premise delivery options

Snow License Manager is designed to reduce the risk, cost and complexity associated with software assets and licensing. Thousands of organizations around the world rely on Snow License Manager to help them avoid overspending on software entitlements and cloud resources while ensuring that they are fully compliant with licensing rules.

Snow License Manager is the hub of Snow’s advanced Software Asset Management (SAM) platform – providing a unified view of all the software, cloud and hardware assets, license entitlements and application usage metrics.

Multiple stakeholders from across the organization can access tailored reports that enable them to instantly:

  • Create Effective License Positions (ELPs) for all software vendors, including Microsoft, IBM, Adobe and more
  • Track software and cloud usage and expenditure
  • Identify and monitor usage of deployed assets and cloud subscriptions
  • Identify opportunities to reduce licensing & support costs.
Snow Inventory - Discover devices, software and cloud services on all platforms, audit software installs and track usage

Whether you work in IT Operations, IT Service Management, Procurement or SAM, Snow Inventory shines a light on all hardware, devices, cloud services and software assets.

Snow Inventory discovers all assets including hardware configuration, software deployments and usage. This insight gives stakeholders such as Software Asset Management, IT Asset Management, Service Desk, Security and IT Operational teams the overview and detailed information they need to inform critical business decisions.

Snow Inventory supports all major enterprise computing platforms, including:

  • Cloud SaaS
  • Cloud IaaS
  • Windows
  • Mac
  • Linux
  • UNIX
  • iOS
  • Windows Phone
  • Thin Client
  • VDI
  • Android

Snow Inventory provides complete asset discovery as well as revealing blind spots on the network and in cloud software and infrastructure. From computers to servers, mobile and tablets to all connected network devices such as routers, printers, and firewalls, all device types are discovered and reported in Snow. Even devices that are not connected to the network at point of audit are included, as are devices with no client agent on them.

VMware Workspace ONE

VMware Workspace ONE

VMware has grown from five technologists working in a small apartment, to a leading innovator in enterprise software. Today the company’s compute, cloud, mobility, networking, and security offerings provide a dynamic and efficient digital foundation to over 500,000 customers globally. VMware technologies have fundamentally changed IT, and with it, the possibilities open to business. Now VMware and its customers have the freedom to build their own digital futures.

Digital Workspace
Make it easy for employees to work anywhere, any time, on any device, without compromising security.

Open/Close all the descriptions
>

Workspace ONE

Intelligence-driven digital workspace platform that delivers and manages any app on any device

Deliver an Engaging Employee Experience with an Intelligence-driven Digital Workspace Platform
Simply and securely deliver and manage any app on any device with VMware Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment.

What Workspace ONE Delivers

Engaging Employee Experiences From Onboarding to Offboarding
Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device.
Unified Endpoint Management
Consolidate management silos across mobile devices, desktops (including Windows 10 and macOS), rugged devices and “things”. Reduce costs and improve security with real-time, over-the-air modern management across all use cases (including BYO).
Intelligence Across the Digital Workspace
Aggregate and correlate data across your entire digital workspace to drive insights, analytics and powerful automation of common IT tasks that improve user experience, strengthen security and reduce IT cost.
Virtual Desktops and Apps
Radically transform traditional VDI and published apps with integrated VMware Horizon and VMware Horizon Cloud, which provides unprecedented simplicity, flexibility, speed and scale – all at a lower cost. A common control plane across the “multi-cloud” enables an architecture and cost model to meet your requirements.
Secure and Simple Application Access
Boost productivity and delight employees with secure, password-free single sign-on (SSO) to SaaS, mobile, Windows, virtual and web apps on any phone, tablet or laptop — all through a single app catalog.
Simplify Zero Trust Security
Combine intrinsic security across device, users, and apps to simplify the enablement of Zero Trust access control. Industry-leading modern management of all devices and access management across all applications makes zero trust access models a reality.

Workspace ONE UEM Powered by AirWatch

Unified endpoint management (UEM) technology that powers Workspace ONE

Manage Every Device and Every Use Case with Unified Endpoint Management
Reduce costs and improve security with modern, over-the-air management of every endpoint – including desktops, mobile, rugged, and IoT – and ensure enterprise security at every layer with Workspace ONE UEM, powered by AirWatch technology.

What Workspace ONE Unified Endpoint Management (UEM) Does
Unifies Endpoint Management
Manage the full lifecycle of any endpoint – mobile (Android, iOS), desktop (Windows 10, macOS, Chrome OS), rugged and even IoT (Linux and others) – in a single management console. Support all your mobility use cases: corporate-owned, BYOD, purpose-built or shared devices.
Modernizes Desktop Management
Optimize desktop OS (Windows 10, macOS, Chrome OS) lifecycle management for a mobile world. The most complete, modern management technology simplifies deployment, provides 100% cloud policy management, streamlines app delivery, automates patching and ensures security.
Automates Processes and Delivers Intelligent Insights
Leverage powerful insights and rules-based automation to optimize employee digital experience, ease the strain on IT and get to a proactive management and security model. Learn more about our intelligence-driven digital workspace platform.
Protects Corporate Apps and Data on Any Network
Provide an intrinsic and comprehensive security approach that encompasses the user, endpoint, app, data and network. Conditional access and granular compliance policies protect company data and ensure hands-free, instant remediation against modern day security threats.
Improves Employee Productivity
Deliver frictionless and secure access to all your business apps – mobile, desktop, SaaS, virtual. The apps include VMware Workspace ONE secure mobile productivity apps – catalog, email, calendar, contacts, web browser, notes, content and more.
Powers Your Digital Workspace
Unified Endpoint Management technology is an essential element in delivering on the promise of a complete digital workspace that reduces IT costs, bolsters security and proactively improves employees’ digital experience.

Workspace ONE UEM Key Highlights

  • Cloud-first, multitenant model to support and better control growing business requirements
  • Real-time desktop modern management from cloud, enhanced with Intelligence automation
  • Automate Windows 10 modern management migration with Workspace ONE AirLift
  • Special purpose mobility with support for ruggedized devices, wearables and IoT
  • Secure Microsoft Office 365 with MAM and conditional access policies across all OS
  • Remote wipe compromised devices instantly to remove sensitive company data
  • Enterprise-grade security fit for government agencies and regulated industries
  • Unified app catalog for one-touch, secure access to any app across any device
  • Robust API framework to support enterprise systems, services, identity, apps, content
Wandera

Wandera

The Wandera team are proven innovators in enterprise cloud services and security. The team founded ScanSafe (now part of Cisco), pioneer of the cloud secure web gateway market and trusted provider to thousands of global enterprises.
The same passion for innovation and focus on customer experience is behind Wandera and the design of our unique transparent gateway architecture. They are excited to help their customers navigate the next generation of enterprise mobility challenges beyond traditional EMM. Recognized by Gartner as a Cool Vendor, and by Computing for Mobile Security Vendor Excellence.

 

Wandera

Open/Close all the descriptions

Security & Management for your Mobile Data

The explosion of billions of mobile devices has created the largest technology footprint for hackers to steal corporate and personal data. At the same time, the escalation of app creation and video content, together with the adoption of 4G, means the demand for data has grown exponentially. Businesses are suffering because they cannot protect, predict or control mobile data.
Wandera helps enterprises prevent threats, enforce policy, all while reducing mobile data usage.

The true strength of the architecture is the ability for administrators to take action using automated policy controls,
including alerts, filters, blocks, caps, and device quarantining to prevent security threats, ensure compliance and manage usage.

The core solution is Wandera’s industry leading protection against the full spectrum of mobile attacks. From device configuration risks, insecure app vulnerabilities, malicious infrastructure and traditional network attacks, Wandera prevents threats in real-time.

Wandera + Airwatch Integration

Wandera and Airwatch partner to provide seamlessly integrated mobile threat prevention

Wandera’s Mobile Data Gateway (MDG) and Enterprise Mobility Management (EMM) suites are becoming central components in enterprise mobility strategies. These two entities combined provide the most comprehensive device and data management capabilities for mobile environments to date. With each picking up where the other leaves off, the two systems work in conjunction with each other to provide unmatched device management, visibility, security, and control.
EMM suites focus on device-level management, which is more persistent in nature. This includes the ability to set policies for password requirements, identity management, network enablement and app distribution.

Wandera’s EMM Connect solution enables deep integration between the Wandera Mobile Data Gateway and AirWatch. By linking the two entities together, an enterprise can realize maximum management efficiency, unified threat outbreak response, and multi-level policy based controls

 

 

PKWARE

PKWARE

PKWARE, Inc. is an enterprise software company founded in 1986, by Phil Katz, co-inventor of the ZIP standard. PKWARE provides encryption and data compression software used by thousands of organizations in banking, financial services, healthcare and government.

 

Open/Close all the descriptions

PKZIP

Reduce file sizes by up to 95% and improve system performance
Year after year, the amount of data being stored and exchanged around the world increases at an exponential rate. Costs for data storage and transmission continue to grow, whether organizations maintain their files on premise or in the cloud. An efficient, flexible solution for data compression is essential for managing costs and resource demands.
Having introduced the ZIP file format nearly three decades ago, PKZIP continues to set the worldwide standard for data compression and file management

Unmatched performance
With PKZIP, organizations can compress files by up to 95%, reducing storage costs and greatly improving file transmission times. PKZIP can handle even the largest compression tasks, with capabilities to include more than 2 billion files in a single archive and compress files over 9 exabytes in size. PKWARE’s lossless compression technology ensures that all data (including file metadata) is retained when a file is zipped.
Flexibility and administrative control
PKZIP is compatible with all major enterprise computing platforms and supports multiple archive formats, making it easy to exchange data across the organization efficiently and effectively. Users can compress files in several archive formats, including ZIP, TAR, BZ2, and many others.
Enterprise customers can use PKZIP’s policy manager to standardize compression activities according to organizational policies and best practices, helping maximize efficiency, system performance, and resource savings.

Features:

  • PKZIP provides exceptional performance and ease of use across all enterprise operating systems.
  • Compression
  • Command Line Interface
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

SecureZIP

Enterprise-grade data encryption
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries.
PKWARE’s SecureZIP enables organizations of all kinds to implement persistent data protection while gaining visibility into where files are used, shared, and stored.

Compression and encryption in one solution
SecureZIP combines PKWARE’s industry-leading compression technology with strong encryption, allowing organizations to reduce data storage and transfer costs while ensuring the security of their information as it moves across hardware platforms, applications, mobile devices, and the cloud.

Industry-leading protection
Available for all major computing platforms, SecureZIP supports passphrase-based and digital certificate-based encryption, offering flexible security for any business environment. SecureZIP also supports two-factor authentication using smart cards or tokens, allowing for an additional layer of security.
With SecureZIP, organizations of any size can reduce the burden of data storage and transmission, while maintaining compliance with internal and external security mandates.

Features:

  • SecureZIP makes it easy to protect sensitive information and reduce the demands on IT infrastructure.
  • Persistent File Encryption
  • X.509 and OpenPGP Encryption
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

Smartcrypt

Next-generation Encryption and key management
The world has changed. Information is everywhere. And you have no idea where it is.
Every day, thieves, snoops, and idiots exploit the gaps in enterprise information security. It’s time to stop believing in solutions that focus solely on network and device access. Today’s threats require us to protect the data itself.
PKWARE’s Smartcrypt is a revolution in enterprise data protection, allowing customers to protect their data at rest and in use, even when it moves outside the organization.

Smart encryption technology
Smartcrypt delivers persistent data protection without the tradeoffs that (until now) have prevented organizations from adopting strong encryption. Previously challenging tasks such as key generation, synchronization, and exchange are completely automated, making the encryption process transparent to end users and easier for administrators to control.

The Smartcrypt platform consists of four components:

Application: An end user application that encrypts and decrypts protected data on any enterprise operating system.
Manager: A web-based management console that gives administrators organization-wide control over encryption activities.
SDK:The Smartcrypt Software Development Kit provides a simple way for developers to embed persistent data protection into existing applications.
TDE: Smartcrypt Transparent Data Encryption (TDE) protects sensitive information at rest on enterprise servers and enables compliance with a wide range of regulatory requirements and customer privacy mandates.

Together, these components create a flexible data security solution that’s compatible with even the most complex enterprise architecture.

Eliminating the threat
Data breaches can burden organizations with massive penalties, sky-high legal fees, and reputation damage than can take years to repair. Smartcrypt, PKWARE’s next-generation encryption and key management solution, eliminates these risks, ensuring that data remains protected everywhere it is used, shared, and stored.

Features:
Smartcrypt delivers a revolutionary combination of functionality, ease of use, and flexibility, allowing organizations to configure an optimal data security solution.

  • Persistent File Encryption
  • Application Layer Encryption
  • Encryption Key Management
  • Key Generation
  • Key Synchronization and Exchange
  • Policy Management and Control
  • Data Security Intelligence
  • X.509 and OpenPGP Encryption
  • Digital Signing and Authentication
  • Compression
  • Cross Platform
WinZip

WinZip

Developed by WinZip Computing now acquired by Corel Corporation

Winzip Standard e Winzip Pro

Zip, protect, manage and share your files with WinZip.

  • Zip and unzip instantly.
  • Manage all your files in one place.
  • Share directly to cloud, social media and IM.
  • Convert to PDF, add watermarks and resize photos.
  • Connect and share on the go with ZipShare

 

 

StarNet

StarNet

StarNet Communications Corporation was founded in 1989 and incorporated in 1990 by engineers working part-time out of their home. The  corporate mission was to create and market powerful, yet affordable PC-X server products for corporate, education and government markets.

The first X Server product, MicroX, was launched in 1991. It enabled users of 286 and 386-based Intel systems to access the X Window System from their personal computers. Quite possibly, StarNet was the first company to base its entire business model on the Internet, because in 1991, the Internet was mostly used by universities and government agencies. As a result, and aided by its low cost, simplicity and focus on the X server functionality, X-Win32 quickly became popular in these sectors.

StarNet has grown its market share by bringing a steady stream of innovations to the market, starting in 2000 with integrating SSH and most recently with FastX which allows users to access their remote Linux and Unix desktop through standard PC browsers. FastX also offers the ability to Suspend/Resume sessions.

 

Open/Close alle the descriptions

X-WIN32

The Best PC X Server for X Windows Display on Your LAN

After nearly 25 years of development, X-Win32 is the most versatile PC X Server for displaying remote Unix and Linux desktops and individual X applications. X-Win32 is widely used in demanding engineering design sectors such as defense/aerospace, molecular biology, and IC design with applications like Cadence Virtuoso.

Best Security

X-Win32 comes with an integrated SSH that encrypts all data between the client and the server, making remote x terminal connections from home and elsewhere very secure.

Fastest 3D/Rendering

The hardware acceleration on the local PC and the implementation of 65 OpenGL extensions allow X-Win32 to offer the fastest OpenGL support in the industry. 3D applications like Catia and Eclipse work like they were running locally.

Text/Graphics
Copy & Paste

X-Win32 is the only PC X Server that offers integrated copying of both text and graphics from X applications into Windows.

Multiple X Desktop

With X-Win32, open remote Unix and Linux desktops from several different hosts at the same time. You can Alt-Tab between Unix, Linux and Windows desktops, even copy data from one host to another.

Dynamic Window Scaling

X-Win32 is the first PC X server having activated the RandRextension, you can now scale the remote desktop simply by grabbing the corner of the window and dragging it to the desired size. You can also scale the window to be larger than your actual monitor.

 

FastX

The First Remote Linux Solution in the Cloud

FastX is the first and only remote Linux solution that allows users to connect to their sessions from any device with a web browser, even from your smart phone.

Linux in a browser

Only FastX gives you the option of using any standard web browser to connect you to your remote Linux sessions (Firefox, Chrome, Internet Explorer or Safari). FastX also works on mobile browsers, so you can check in from your smart phone or tablet.

Fastest Remote Linux Display

FastX displays your remote Linux or Unix desktops or individual X applications faster than any other solution over both LAN and WAN connections. You can work on demanding graphic applications (EDA tools) when connecting over VPN to servers even thousands of miles away.

An Affordable Solution

FastX costs a fraction of what commercial competitors charge. the combination of a lower cost, better performance and security, and advanced end-user and admin features make FastX the best X Windows emulator on the market.
Admin tools

FastX offers an array of administrator tools to keep your team running securely and efficiently. Server monitoring, scripted installation and theme support, to name a few.

Load Balancing

Only FastX gives you the option of using any standard web browser to connect you to your remote Linux sessions (Firefox, Chrome, Internet Explorer or Safari). FastX also works on mobile browsers, so you can check in from your smart phone or tablet.