Features
Become a company that is completely in control
Remotik gives you the features to make your business more efficient, productive and secure in one go. Through seamless integration with operating systems such as: Windows, macOS or Linux, Remotik makes cybersecurity, GDPR-compliance and continuity easier than ever.
FEATURES FOR IT-MANAGEMENT
Multi-operating system support
Remotik fits on every major operating system. The agent is built in C and has ports for 32 and 64bit Windows, Linux (x86 & ARM), MacOS and FreeBSD. The server is built on NodeJS.
Remote Desktop and Terminal
Take advantage of the remote web based desktop and terminal. Control your hardware from any web browser.
Remote file access
Instantly centrally access local device storage. Get full, secure access to files from anywhere on Earth: download, upload, rename, create new folders, and more.
Roles and rights
Give employees access only to the systems and data relevant to their responsibilities. This increases efficiency, prevents unauthorized access and minimizes risks.
Optional Intel AMT support
Using Intel®AMT, administrators can remotely boot to the BIOS and manage a system. Regardless of the operating system status.
Server file storage
Use the server as a file storage to upload, download and make files available to third parties. Makes it easy to use your Remotik server as a file storage server in the cloud.
Real-time user interface
The Remotik web interface is fully real-time. Users never have to click ‘refresh’. See all device connections and activities live.
Text and video chat with colleagues
During a remote support session, you can start a chat session with the remote user. With WebRTC, you can audit and video chat live.
Power state monitor and control.
Enable remote device power management. See which device is powered on and use existing live devices to send Wake-on-LAN commands to remote networks.
Local port forwarding
Use the router tool to map local TCP or UDP ports on your local machine to ports on remote devices. Run RDP or SSH sessions on devices anywhere on the Internet.
FEATURES VOOR MANAGEMENT
E-learning environment
Boost your organization with our e-learning and benefit more from the advantages of Remotik. With the e-learning, employees quickly and efficiently discover what they can do with Remotik.
Centralized Activity Log
Track what users are doing on remote devices with a real-time log. Easily filter by device or user.
Session recording
Add an extra layer of auditing capabilities. And gain better control over what is happening in your organization. Optionally, have the server record all remote desktop, terminal, and Intel AMT KVM sessions for later playback. Session recording
FEATURES FOR IT-SECURITY
2-Factor-Authentification
Passwords alone are no longer enough. Two-factor authentication protects your organization better against phishing and other forms of cybercrime.
Let's Encrypt
With built-in support for Let’s Encrypt, Remotik automatically renews TLS certificates for your domain names. Simplify the first step in gaining your users’ trust.
Strong Cryptography
Standard strong cryptography, including: SHA385, AES 256, and RSA 3072. This is recommended best practice for protection against cybercrime performed by quantum computers.
Transport Layer Security 1.3 or TLS in short
Remotik uses strong cryptographic transport protocols: TLS1.3 on its HTTPS port 443. It disables the use of weaker versions of TLS on that port.
Strong password enforcement
Users of accounts are required to use strong passwords. Optional: requires use of two-factor authentication.
Encryption of database records
If desired, Remotik encrypts all sensitive fields before storing them in the database. This extra security on your database is in addition to the standard encryption provided on your database.
HTTP Content Protection
Protect yourself from any possibility of unwanted cross-site scripting and other attacks. Remotik uses HTTP headers that contain browser instructions to restrict the source of the loaded content.
FIDO2 support
With built-in support for hardware authentication keys (Bluetooth, USB and NFC), you can set an additional authentication factor as an administrator. This provides you with extra protection against phishing.
Token binding of IP address
All session tokens and cookies generated by Remotik are bound to the source IP address of the requester. This makes it impossible to reuse stolen tokens from another IP address.
Support for reverse proxies
Remotik supports reverse proxies. This allows Remotik to be installed in most modern data centers without Remotik knowing the main HTTPS private certificate key.
HashiCorp Vault Support
Add an extra layer of protection. Configure Remotik to retrieve all settings and secrets and store them in Vault. This makes your server stateless.
Strong Password Hashing
By default, Remotik account passwords are hashed using PBKDF2 with 12,000 rounds of SHA384 and a 128-byte salt. A security that provides resistance to dictionary attacks.