SysAid Remote Control
SysAid’s built-in remote control capabilities allow IT support people to connect to
end-user active sessions, or unattended computers, to give remote assistance.
SysAid’s remote support software provides simple, no-configuration-necessary options for performing remote support and remote control via the following methods of remote control communication:
SysAid’s remote support software works with any remote machine running the following Windows operating systems:
Your security is one of SysAid’s top priorities when using our remote support software. The remote control software does not run continuously between sessions. It is initiated only when a remote support or control request is identified by a SysAid agent, and then the connection to the authorized requestor is made (and within a fully encrypted session).
Frequently Asked Questions
What Is Remote Support Software?
Remote support software is the bridge between IT support people and end-users or unattended computers. It enables IT support teams to connect and give assistance from afar, such as by providing technical support to customers, file sharing, session recording, and more. Plus, SysAid’s remote support software has no configuration needed for performing remote support and remote control.
What Operating Systems Support SysAid’s Remote IT Support?
SysAid’s remote IT support software works with Windows 7,8, and 10, Windows server 2008, 2012, and 2016, and Mac OS X Yosemite, El Capitan, and Sierra.
How Secure Is SysAid’s Remote Support Software?
Security is our top priority at SysAid when running our remote support software. Once a remote support control request is initiated by a SysAid agent, the connection is made within a fully encrypted session to an authorized requestor. There are additional security features that we include to ensure your privacy is fully protected. Such as including built-in authentication methods to protect against attacks, having no required open ports on the end-user side, and logging all remote control sessions in the asset activity log for auditing.
Start Crushing IT