Intuitive and reliable remote desktop platform
ISL Online is a remote access software designed to streamline customer support. With an intuitive layout and easy setup process, you can gain permanent and uninterrupted access by installing the remote agent on any target device. It allows you to manage unlimited and even unattended stations, and sort them into groups for easier navigation.
Backed by industry standards in end-to-end encryption, ISL Online ensures that you access and transfer data between various endpoints without worries. One key feature of this platform is its support for customization. You can add your brand visuals or insert additional elements that suit your workflow.
Exploring the ISL Online environment
There are two main use cases for ISL Online. One is when a user is on the client side, which is useful for requesting remote support or hosting training sessions. To initiate a session, the client-side user may click on a provided link or enter the session code. Conversely, the remote access platform is also designed to support unattended access to the client device—provided that the remote agent is installed and is configured to allow access, even without a user on the receiving end.
Various connectivity options give ISL an advantage. With desktop apps, ISL Light is required to start a session, and the ISL Light Client is needed on the receiving end. Aside from the quick installation processes, the client device only needs to enter a session code to allow access. Conversely, you can direct your clients to www.islonline.net and simply key in the session code.
Beyond the standard remote control setup, the platform has other features to make remote support easier for clients. For example, you can add a button or a widget on your company website that either creates a remote session or redirects them to the ISL client downloader. You can do this without having to write custom lines of code.
Meanwhile, large organizations can leverage ISL’s ability to route Microsoft Remote Desktop Protocol (RDP) through a secure tunnel. Your support team can access unattended computers over the internet. Even better, this Remote Desktop Tunneling only requires one computer to have ISL AlwaysON installed. You can connect to other computers in the network via RDP or SSH, without having to set up VPN tunnels or reconfigure firewalls.
More importantly, below are some features that give ISL users unprecedented freedom and productivity:
- View Region: While other apps only show full-screen displays from the client device, this platform lets you define specific areas that will be visible.
- Session Recording: Its built-in recorder lets you capture your entire remote session, making it useful for documentation or training.
- Administrative Mode: This online administrative mode lets you connect with Windows User Account Control (UAC) from the remote computer—provided that admin rights are enabled.
- Reconnect After Restarting: Its remote sessions automatically reconnect even after the client PC has been restarted, which is particularly useful for installing apps or updates.
- Live Chats and Video Calls: Establish real-time communications with the client device user and exchange information.
- Support for Multiple Displays: Flexible display capabilities allow you to switch between displays in a single window or display all monitors, each in a separate window.
- Force Black Screen: For compartmentalized access and privacy, you can black out the client display and restore it once you’re done.
- Two-Factor Authentication (2FA): Set up another layer of security through an authorized email or a third-party device.
Additionally, you can customize access and control availability from the client’s end for unattended access. To help manage multiple remote devices from one server unit, you can create computer groups by location, purpose, or other parameters for easier navigation.
Manage sensitive information with confidence
For its base security, ISL Online is equipped with AES 256-bit encryption which protects data traveling from the server to the client device. Additionally, access from both ends of the remote session is protected with RSA 2048/4096 bit, supported by Diffie-Hellman Key Exchange technology. Additionally, all instances of ISL Online are digitally signed, which means they are verified and traced back to the original software publisher.
To prevent conflicts with your existing security measures, it has a Port Filtering capability that automatically integrates with your firewall without additional configurations. Additionally, system administrators are given the ability to assign different permissions. This includes quickly enabling and disabling access to specific devices. To ensure client control and transparency, this platform does not support a stealth mode—with the receiving end capable of terminating the session anytime.
Remote access technology for companies of all sizes
In terms of pricing, ISL Online offers sufficient flexibility depending on the remote network you’re looking at. Individual users can avail of its Pay-Per-Use plan, which supports five licensed users and access to an unlimited number of devices. Larger organizations can choose whether to host the service on the Cloud or avail of a Self-Hosted infrastructure, both with unlimited users—although the price varies depending on the number of concurrent users.
Lastly, the Enterprise Plan lets you enjoy unlimited users and devices, regardless of the number of concurrent users. More importantly, this plan comes with a Managed Private Cloud running on a single-tenant architecture—guaranteeing privacy and security dedicated to your needs. ISL even assigns a customer success manager to your account.
A powerful and versatile remote access tool
Overall, ISL Online offers a versatile alternative for large organizations and remote service providers who need to manage their remote sessions. Its support for different connectivity options makes it flexible for various applications. Even its remote sessions offer additional capabilities such as limiting end-user accessibility and customizing security protocols. With its different industry-standard technologies, you can securely manage multiple devices without worrying about unauthorized access.