Remote Desktop Manager
Compare editions
Remote connection management
Description
Launch connections to privileged sessions, remote servers, virtual machines, websites, and applications with a single click using credential injection.
Integrates with the most popular protocols and remote connection types as well as more than 60 add-ons.
Integrated VPN connection management with Microsoft, Cisco, SonicWall and IPsecVPN; also supports VPN route management.
Easily export information in an XML file.
Import sessions from other applications like Dameware, KeePass, RDCMan and more; import information from a CSV file or directly from Active Directory.
Supports custom variables (host, username, domain, password) and Windows environment variables; also supports automated typing macro on connect or disconnect.
Automated typing macro on connect or disconnect.
Password management
Description
Using U.S. Federal Government-approved encryption, RDM protects your privileged accounts in a centralized vault.
RDM stores sensitive information, such as bank account details, email addresses, passport details, credit card numbers, and alarm codes, in a highly secure and centralized vault.
Generate strong random passwords with an integrated password analyzer and password history reports.
Set your password on a parent folder for the children folders to inherit it. The latter enables entries to inherit credentials from a parent folder.
Securely stores all your PDF, Word, Excel, Visio and image documents directly in the database for easy sharing.
Allows each user to have their own user vault only they can access.
RDM integrates with 1Password, Dashlane, KeePass, LastPass, and more.
Directly imports credentials from other applications, including 1Password, KeePass, LastPass.
Secure access to critical assets
Description
Directly inject credentials into endpoints like servers, workstations, and applications while Devolutions Workspace browser extension offers autologin to websites.
The browser extension integrates with Internet Explorer, Firefox, Google Chrome and Opera.
All passwords are encrypted by default.
Database double encryption with personalized passphrase or certificate.
The role-based access control enables the creation of a granular protection system, giving the flexibility to manage more permissions.
Add a layer of protection to your data source using multi-factor authentication tools like Duo, Yubikey, or any TOTP application.
Keeps track of all modifications, allowing you to view the change history and easily roll back any unwanted change or deletion.
Cross-platform
Description
Available for Windows, macOS, Linux, Android, and iOS platforms.
While on mobile devices, open remote sessions to endpoints to quickly fix issues in the field.
Clients are built native to their operating systems for performance and security.
Connect to more than a single data source while on the go.
Conveniently built-in tools such as ping, SSH private key generators, and file managers are available for mobile clients.
Ease of management
Description
Retrieve passwords and approve requests wherever you are using your smartphone.
Offers a quick overview of a machine's state using integrated virtualization consoles, such as Hyper-V, Terminal Server, Citrix XenServer and VMware.
Offers integrated consoles, such as Active Directory, VMware, Hyper-V, Amazon EC2, and Microsoft Azure.
Access your database even when there is no Internet connectivity.
Supports any command line tool, keyboard macros, PowerShell, WASP PowerShell and more.
Modify or import entries with PowerShell; open any connection directly from a script.
Audits and reports
Description
Capture all events surrounding privileged account operations, including login attempts and history.
Clear view of password access and audit traces.
Generate exhaustive access logs to keep track of privileged user activity.
Provide a clear view of which users are currently connected to servers within the same vault.
Optional connection warning for already connected users.
Export your report as a CSV file or execute and export your report through a command line.
Generate exhaustive report of failed login attempts and history.
Receive notifications on expired and expiring entries and license events.