Heimdal Remote Desktop -1 Year
Non-returnable
AED1,324.80
Anything. Anywhere. Anytime.
Heimdal Remote Desktop is a unique approach to remote access & control, sporting a proprietary inter-device, data-transmission engine to circumvent Microsoft’s RDP and bridge the non-Windows device communication gap.
Unique, flexible, and accessible
Remote Desktop will enable you to offer remote support to your employees or customers without having to rely on proprietary remote access tools or purchase additional remote desktop licenses.
Unlimited remote sessions
Heimdal RD supports two session types – attended and unattended. In an attended session, the supporter-initiated session can commence only on end-user approval. Accounts for most of the remote support sessions. Unattended sessions are pre-approved (i.e., user not interrogated on session initiation) and mostly employed to force-push GPs, modify server-side configurations, uninstall unstable software on the end-user-side, or other jobs that do not necessarily require the user’s approval.
With Heimdal® Remote Desktop you will be able to:
Connect with any endpoint, across Windows OS, and provide support from anywhere in the world via dashboard or agent.
Tags:



Product Details
Full features tables:
- Multi-platform support: dashboard-to-agent, agent-to-agent, and dashboard-to-no-agent.
- Multi-sessions. A supporter can initiate two or more remote sessions from the dashboard or agent.
- Transfer remote session. A supporter can transfer the remote session to another supporter. The second supporter must be validated and appointed supporter in the same GP as the first supporter.
- Invite additional supporters. A session can support more than one supporter. Only a supporter can invite additional supporters.
- Screen sharing. In-session screen-sharing options include keyboard and mouse control and tweaking the streaming quality.
- File and content sharing. RD supports pre-approved and user-approved file transfers. An event log can be activated during or after the session to review all transfers.
- Video Recording. Enforce video recording for active sessions.
- Audit log. At session end, a backlog is made available.
- Secure connection with MFA and RSA 2048/4096-bit public/private key exchange to negotiate a final symmetrical AES 256-bit end-to-end encryption.