G2 Crowd builds the world's largest business commerce platform fueled by $100M in funding šŸš€
SecureLink Secure Remote Access

SecureLink Secure Remote Access

4.3
(66)
Optimized for quick response

SecureLink Secure Remote Access manages secure third-party remote access and remote support for enterprise organizations and technology vendors. World-class companies across multiple highly regulated industries, including healthcare, retail, government, financial, legal and gaming, rely on SecureLinkā€™s purpose-built platform to securely control network access, ensure industry compliance, manage audit trails, decrease time to resolution, and reduce liability.

Work for SecureLink Secure Remote Access?

Learning about SecureLink?

We can help you find the solution that fits you best.

SecureLink Secure Remote Access Features

Authentication Options

Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users

91%
(Based on 5 reviews)

Local Access

Controls access to legacy applications, web based applications, network resources and servers.

Not enough data available

Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

Not enough data available

Mobile Support

Provides mobile application for required mobile os platform and enables single sign on for native and web based business applications

Not enough data available

Breath of support for target systems

Standard integrations to most common cloud and on premise applications

Not enough data available

Supports BYOD users

Enables users to use their own device to access company applications.

Not enough data available

Multi-Factor Authentication

Supports Required Access Types

Works with required networking products and applications out of the box such as: VPN, Web, Cloud applications, Local/Remote Desktop

Not enough data available

Supports Required Authentication systems

Includes or supports required authentication technologies. Example systems: One Time Passwords, bioMetric, knowledge based, key cards, mobile phone based tokens, etc

Not enough data available

Administration

Usage Information

Offers visibility into employee device activity

Not enough data available

Integrations

Allows for integration of support, chat, diagnostic or other IT management tools

Not enough data available

Diagnostics

Provides administrators with performance information to

Not enough data available

Session Recording

Provides the ability to record remote access and support sessions

Not enough data available

Session Transfer

Allows remote access and support sessions to be transferred between users

Not enough data available

Unattended Access

Allows administrators access to devices, regardless of end-user's presence

Not enough data available

File Sharing

Allows remote users to share files with other remote users

Not enough data available

Identity Directories

On-premise identity repositories supported

Variety and Quality of integrations (ie Active Directory, LDAP)

Not enough data available

Application as profile master

Directory treats the user's profile that is in an application as the ongoing source of truth for that user's profile. Changes to profile in master application drive changes to profiles in other applications.

Not enough data available

Cloud Directory

Provides cloud based directory option that contains all user names and attributes

Not enough data available

Platform

Cross-Platform Access

Allows remote usage and access across a range of operating systems and device types

Not enough data available

Mobile Device Access

Allows remote desktop administrators access to connected mobile devices

Not enough data available

Applicatons Management

Centrally manages, configures, and oversees applications on employee devices

Not enough data available

Remote Device Control

Allows administators to take control of a connected endpoint device

Not enough data available

Provisioning

Self Service Access requests

Users can request access to an application and be automatically provisioned if they meet policy requirements

n/a

Smart/Automated Provisioning

Automates account/access rights creation, changes and removals for on-premise and cloud apps

n/a

Bi-directional Profile Synchronization

Keeps all profile attributes consistent across applications whether the change is made in the provisioning system or the application

n/a

Profile attribute transformation

Transforms profile atributes to the required format for all of the systems being updated

n/a

Role Management

Establish roles that create a set of authentication rights for each user in the role

85%
(Based on 5 reviews)

Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes

88%
(Based on 5 reviews)

Access Termination

Terminate access to multiple applications based on dates

88%
(Based on 5 reviews)

Approval Work-flows

Allow business stake-holders/managers to approve or reject requested changes to access via a defined work-flow

n/a

Security

Remote Wipe

Enable the remote locking down and encryption of employee devices

Not enough data available

Device Management

Unifies endpoint management of employee devices

Not enough data available

Device Enrollment

Registers employee-owned or company-distributed devices for IT access

Not enough data available

Governance

Identifies and Alerts for Threats

Alerts administrators when inappropriate access occurs

n/a

Compliance Audits

Proactively audits access rights against policies

n/a

Administration

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

Not enough data available

Ease of set up for target systems

Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured

85%
(Based on 5 reviews)

Bulk Changes

Change users and permissions in bulk

n/a

Self Service Password Administration

Users can set, change passwords without interaction from IT staff

n/a

Platform

Customization

Supports customizable UI

n/a

Reliability

Cloud based service has minimal downtime

91%
(Based on 5 reviews)

Performance/Scalability

Service performs well under significant use and can scale to support large number of users

Not enough data available

Security

Vendor follows appropriate security protocols and has appropriate certifications to ensure no breech of confidential data occurs

91%
(Based on 5 reviews)

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

91%
(Based on 5 reviews)

Federation/SAML support

Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.

Not enough data available

Cross Browser support

Support access to browser based applications across required browser types

Not enough data available

Reporting

Contains pre-built and custom reporting tools to required to manage business

Not enough data available

APIs

Provides appropriate application interfaces to enable custom integrations for unique business requirements

Not enough data available