- Buy Online or call 407-562-1868
Anytime, Anywhere Access to Pano Virtual Desktops
Pano Remote provides Pano System for VDI users with remote access from a remote location over a wide-area-network like the Internet. A secure USB key lets users easily access their Pano virtual desktops when they are away from the office, whether working in the evening or when traveling.
Pano Remote can also help you inexpensively extend your Pano virtual desktop deployment to larger populations of transient users, such as guest users, users needing limited and intermittent access to a virtual desktop, or mobile temporary workers, without requiring you to provide them with a Pano device to take with them. Anywhere and anytime they can find a Windows PC with a network connection, they can use their Pano virtual desktop.
Pano Remote is delivered already installed on a secure USB key and can be used with any laptop or desktop computer running Microsoft Windows XP, 7 or Vista.
Pano Remote provides access to a desktop virtual machine either in a window or using the full screen on the hosting system. Administrators can set policies in Pano Controller to allow or restrict access to local printers and drives along with controlling transfer of data on the clipboard between the virtual desktop and the hosting operating system.
Pano System for VDI must be purchased separately.
Security in Pano Remote
Security is provided via a Secure Sockets Layer or HTTPS connection for RDP-based traffic between the Pano Remote software and the included Pano Gateway plug-in installed into a Microsoft Windows Server 2008 R2 Remote Desktop Services. This ensures both that communications over a WAN like the Internet are secured and that you can control and secure the traffic coming across your firewall to your hypervisor servers.
With Pano System 6.0 you can optionally require entry of a RSA SecurID passcode along with a user name and password. Pano Controller integrates with the RSA Authentication Manager 7.1 SP4 to provide increased security via two-factor authentication.
More information is available on the Mobile Computing page.