Features

Become a company that is completely in control

Remotik gives you the features to make your business more efficient, productive and secure in one go. Through seamless integration with operating systems such as: Windows, macOS or Linux, Remotik makes cybersecurity, GDPR-compliance and continuity easier than ever.

FEATURES FOR IT-MANAGEMENT

Multi-operating system support

Remotik fits on every major operating system. The agent is built in C and has ports for 32 and 64bit Windows, Linux (x86 & ARM), MacOS and FreeBSD. The server is built on NodeJS.

Remote Desktop and Terminal

Take advantage of the remote web based desktop and terminal. Control your hardware from any web browser.

Remote file access

Instantly centrally access local device storage. Get full, secure access to files from anywhere on Earth: download, upload, rename, create new folders, and more.

Roles and rights

Give employees access only to the systems and data relevant to their responsibilities. This increases efficiency, prevents unauthorized access and minimizes risks.

Optional Intel AMT support

Using Intel®AMT, administrators can remotely boot to the BIOS and manage a system. Regardless of the operating system status.

Server file storage

Use the server as a file storage to upload, download and make files available to third parties. Makes it easy to use your Remotik server as a file storage server in the cloud.

Real-time user interface

The Remotik web interface is fully real-time. Users never have to click ‘refresh’. See all device connections and activities live.

Text and video chat with colleagues

During a remote support session, you can start a chat session with the remote user. With WebRTC, you can audit and video chat live.

Power state monitor and control.

Enable remote device power management. See which device is powered on and use existing live devices to send Wake-on-LAN commands to remote networks.

Local port forwarding

Use the router tool to map local TCP or UDP ports on your local machine to ports on remote devices. Run RDP or SSH sessions on devices anywhere on the Internet.
FEATURES VOOR MANAGEMENT

E-learning environment

Boost your organization with our e-learning and benefit more from the advantages of Remotik. With the e-learning, employees quickly and efficiently discover what they can do with Remotik.

Centralized Activity Log

Track what users are doing on remote devices with a real-time log. Easily filter by device or user.

Session recording

Add an extra layer of auditing capabilities. And gain better control over what is happening in your organization. Optionally, have the server record all remote desktop, terminal, and Intel AMT KVM sessions for later playback. Session recording
FEATURES FOR IT-SECURITY

2-Factor-Authentification

Passwords alone are no longer enough. Two-factor authentication protects your organization better against phishing and other forms of cybercrime.

Let's Encrypt

With built-in support for Let’s Encrypt, Remotik automatically renews TLS certificates for your domain names. Simplify the first step in gaining your users’ trust.

Strong Cryptography

Standard strong cryptography, including: SHA385, AES 256, and RSA 3072. This is recommended best practice for protection against cybercrime performed by quantum computers.

Transport Layer Security 1.3 or TLS in short

Remotik uses strong cryptographic transport protocols: TLS1.3 on its HTTPS port 443. It disables the use of weaker versions of TLS on that port.

Strong password enforcement

Users of accounts are required to use strong passwords. Optional: requires use of two-factor authentication.

Encryption of database records

If desired, Remotik encrypts all sensitive fields before storing them in the database. This extra security on your database is in addition to the standard encryption provided on your database.

HTTP Content Protection

Protect yourself from any possibility of unwanted cross-site scripting and other attacks. Remotik uses HTTP headers that contain browser instructions to restrict the source of the loaded content.

FIDO2 support

With built-in support for hardware authentication keys (Bluetooth, USB and NFC), you can set an additional authentication factor as an administrator. This provides you with extra protection against phishing.

Token binding of IP address

All session tokens and cookies generated by Remotik are bound to the source IP address of the requester. This makes it impossible to reuse stolen tokens from another IP address.

Support for reverse proxies

Remotik supports reverse proxies. This allows Remotik to be installed in most modern data centers without Remotik knowing the main HTTPS private certificate key.

HashiCorp Vault Support

Add an extra layer of protection. Configure Remotik to retrieve all settings and secrets and store them in Vault. This makes your server stateless.

Strong Password Hashing

By default, Remotik account passwords are hashed using PBKDF2 with 12,000 rounds of SHA384 and a 128-byte salt. A security that provides resistance to dictionary attacks.

Want to find out more on Remotik security benefits?

Get those benefits!