RealVNC Enterprise 5.2.1

Enable remote control connections between Windows, Mac OS X, UNIX, and Linux computers. License the software to suit your needs, from individual, private use to a robust, responsive, ultra-secure enterprise-class solution.


VNC is remote access and control software for an unrivalled mix of Windows, Mac, UNIX and Linux computers. With a simple peer-to-peer architecture, no agents or centralized servers are required.

Enterprise
Fully-featured, ultra-secure, easily-administered remote control for personal and for medium and large-scale commercial use.

Features:

Cross-platform remote control
Enable connections to be established between computers running an unrivalled mix of Windows, Mac OS X, UNIX, and Linux operating systems.

VNC authentication
Prevent unauthorized access with a password specific to VNC. Note passwords are always encrypted, even if encryption is turned off or not supported.

128-bit AES encryption
Encrypt connections using 128-bit AES, for high performance encryption. This means that all data transmitted while connections are in progress—keystrokes and mouse movements made by users; screen captures sent back in order to display the desktop—are resistant to packet sniffing and tampering, man-in-the-middle attacks, and other malicious eavesdropping.

System authentication
Authorize users to connect using the already-familiar credentials of their own user accounts on a computer. Note passwords are always encrypted, even if encryption is turned off or not supported.

Optimized performance
Patented algorithms for encoding screen data enable the user experience to be as seamless as your network connection will allow.

Printing
Enable connected users to print files directly to printers connected to their own computers.

File transfer
Enable connected users to transfer files in either direction, and also share with other users connected at the same time.

Chat
Enable connected users to chat to other users connected at the same time, or with a host computer user.

Dedicated support channel
Get help when you need it, and in addition receive free upgrades for the duration of the contract. On expiry, you can renew for a competitive fee to continue receiving help and upgrades.

Single sign-on authentication
Automatically authorize users to connect using the credentials they have already entered to log on to their own computers. Note all computers must be in a managed network environment, with (for example) a Kerberos authentication server.

256-bit AES encryption
Encrypt connections using ultra-secure 256-bit AES, for ultra-high performance encryption. This means that all data transmitted while connections are in progress—keystrokes and mouse movements made by users; screen captures sent back in order to display the desktop—are resistant to packet sniffing and tampering, man-in-the-middle attacks, and other malicious eavesdropping.

Powerful deployment strategies
Remotely deploy, license, and configure VNC on potentially thousands of computers.

Configure and lock down using policy
Remotely configure and license VNC using policy. This also means VNC applications are locked down and cannot be changed by users.