SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
RemoteExec
®
Enterprise-wide remote installations, updates and executions.
RemoteExec offers IT professionals a feature-rich, enterprise software
solution that facilitates and automates tasks associated with remote
installations.
The challenge
Application deployment and Windows systems updating can be cumbersome and time consuming
tasks without the help provided by efficient tools.
Managing servers and workstations on Windows system across a network can be made far easier by
automating, scheduling and performing such tasks remotely which might otherwise require
a desk visit or time spent after working hours.
The solution
As a single interface for all remote deployment and execution, RemoteExec safeguards the
Windows infrastructure by minimizing the response time, workload and risk involved with
emergency application deployments, updates and patches.
A fully agentless solution, it is fast and easy to install, simple to use and totally non-intrusive.
An integrated scanner collects system configuration information to launch conditional
executions, actions with multiple steps can be grouped together into one single task for
execution and disruptive interventions are eliminated by scheduling deployments outside of
working hours. Once finished any failed actions are automatically rerun to complete the task.
From a user friendly GUI, monitor the progress of deployments, get instantly informed
of results and quickly support end-users by completing Windows Administration tasks
remotely.
Key Benefits
Centralized, single point for controlling,
managing and reporting on all remote de-
ployment and execution
Perform executions on thousands of re-
mote systems in minutes
Significantly speed up and reduce worklo-
ad when updating Windows Systems
Minimize security risks by reacting instant-
ly to emergency situations (from zero-day
vulnerability that requires applying a
patch, to an executive’s request for a spe-
cific application)
Eliminate all disruptive interventions du-
ring working hours with advanced sche-
duling.
Silently perform remote executions in the
background
Quickly support end-users by completing
Windows Administration tasks remotely
About IS Decisions
IS Decisions is a global software company specializing in Security & Access Management solutions for Microsoft Windows and Active Directory.
More than 3,000 customers around the world rely on IS Decisions software and include:
RemoteExec
®
Enterprise-wide remote installations, updates and executions.
Remote Application Deployment
Easily deploy or schedule MSI packages, Service Packs,
updates, patches and hotfixes to all required Windows systems.
Remote File Execution
Remotely execute programs (.exe, .bat, .cmd), scripts (.vbs, .js), and
associated files (.txt, .doc, .wav, .reg, .inf, .msi…) or schedule them
for a later date or time.
Remote PC Interaction
Automatically and remotely power off, reboot or shutdown
systems, wake up PCs equipped with Wake-On-LAN technology
and lock or close user sessions.
Remote Configuration Management
Registry Updates
Registry modifications or updates can be made on Windows Sys-
tems throughout the network, or of a specific subset of computers.
File Management
Deploy a file or the content of a whole folder across many
computers. Update or delete a specified file or folder on Windows
systems of your choice throughout the network.
Password & local account management
Remotely change the local administrator password on many
computers and disable all other local accounts in order to reinforce
security.
Ease of Use & Enterprise Value
www.isdecisions.com | info@isdecisions.com
Technopôle IZARBEL - Créaticité Bât. A
BP12 - 64210 Bidart - FRANCE
Phone: +335.59.41.42.20 - Fax: +335.59.41.42.21
Schedule deployments to workstations outside of working hours
or to automatically rerun previously failed actions due to system
unavailability (unconnected laptops, etc.).
Schedule all Remote Actions
RemoteExec automatically provides success or failure reporting for
any job it executes. That list can be directly reinserted to rerun the
execution and complete the task.
Manage and Report on all Remote Actions
RemoteExec can send instant alerts to users by displaying pop-ups
and/or running sound files, enabling administrators to warn of any
upcoming downtime or maintenance event
Send User Alerts
RemoteExec can be used to silently perform remote executions
in background, or can launch interactive executions displaying
information to the user and requiring their interaction.
Launch Silent or Interactive Executions
RemoteExec can also be used via the command line mode and be
invoked by a script or any automation tool if needed.
Command Line Mode
RemoteExec is an agentless, encrypted solution that only requires
ICMP (ping) and Microsoft File and Printer Sharing (SMB TCP 445).
Agentless, Non-intrusive & Secure
Save remote action configurations and lists of target computers
and reuse them for future tasks.
Create and Reuse Customized Lists
RemoteExec is equipped with a mini scanner to allow system
configuration information to be collected remotely and used for
conditional executions: OS version, OS level (server/workstation),
Service Pack, etc…
Launch Conditional Executions
Group together actions with multiple steps into one single task
for execution.
E.g. Use Wake on LAN to turn a target PC on > Deployment of
one or more patches > File and folder replication > Registry
modification > System power off
Group Multi Action Events

Mais conteúdo relacionado

Mais procurados

4818467 complete workbook_guide_for_laptop_maintenance_and_repair
4818467 complete workbook_guide_for_laptop_maintenance_and_repair4818467 complete workbook_guide_for_laptop_maintenance_and_repair
4818467 complete workbook_guide_for_laptop_maintenance_and_repairJaicoDictaan1
 
Rick's assignment software utilities
Rick's assignment software utilitiesRick's assignment software utilities
Rick's assignment software utilitiesJames London
 
Lecture1423726024
Lecture1423726024Lecture1423726024
Lecture1423726024deepakjeetu
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0SecPod Technologies
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2Jack Bishop
 
Unified threat management software 21 july 17
Unified threat management software 21 july 17Unified threat management software 21 july 17
Unified threat management software 21 july 17Yabibo
 
Unified threat management software 15 july 17
Unified threat management software 15 july 17Unified threat management software 15 july 17
Unified threat management software 15 july 17Yabibo
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer systemRachel Espino
 
Purpose of Operating Systems
Purpose of Operating SystemsPurpose of Operating Systems
Purpose of Operating Systemsolivixjohnson
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentationardhita banu adji
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems scriptsommerville-videos
 

Mais procurados (20)

Software1
Software1Software1
Software1
 
4818467 complete workbook_guide_for_laptop_maintenance_and_repair
4818467 complete workbook_guide_for_laptop_maintenance_and_repair4818467 complete workbook_guide_for_laptop_maintenance_and_repair
4818467 complete workbook_guide_for_laptop_maintenance_and_repair
 
Rick's assignment software utilities
Rick's assignment software utilitiesRick's assignment software utilities
Rick's assignment software utilities
 
Lecture1423726024
Lecture1423726024Lecture1423726024
Lecture1423726024
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Microsoft System center
Microsoft System centerMicrosoft System center
Microsoft System center
 
Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0Take a sneak peek into Saner 2.0
Take a sneak peek into Saner 2.0
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2
 
Lesson 2.2
Lesson 2.2Lesson 2.2
Lesson 2.2
 
Security
SecuritySecurity
Security
 
Unified threat management software 21 july 17
Unified threat management software 21 july 17Unified threat management software 21 july 17
Unified threat management software 21 july 17
 
Unified threat management software 15 july 17
Unified threat management software 15 july 17Unified threat management software 15 july 17
Unified threat management software 15 july 17
 
Fault tolerance techniques
Fault tolerance techniquesFault tolerance techniques
Fault tolerance techniques
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
 
Purpose of Operating Systems
Purpose of Operating SystemsPurpose of Operating Systems
Purpose of Operating Systems
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentation
 
Operating system security
Operating system securityOperating system security
Operating system security
 
CoreSecurity
CoreSecurityCoreSecurity
CoreSecurity
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 

Destaque (7)

English lesson15
English lesson15English lesson15
English lesson15
 
Skolelevers drogvanor 2010
Skolelevers drogvanor 2010Skolelevers drogvanor 2010
Skolelevers drogvanor 2010
 
Bakom Styret I GöTeborg Av Emelie
Bakom Styret I GöTeborg Av EmelieBakom Styret I GöTeborg Av Emelie
Bakom Styret I GöTeborg Av Emelie
 
Realmente Fascinante1 Hw Jul1207
Realmente Fascinante1  Hw  Jul1207Realmente Fascinante1  Hw  Jul1207
Realmente Fascinante1 Hw Jul1207
 
Miigaaaaa
MiigaaaaaMiigaaaaa
Miigaaaaa
 
Measuring Organization Engagement
Measuring Organization EngagementMeasuring Organization Engagement
Measuring Organization Engagement
 
Realmente Fascinante
Realmente FascinanteRealmente Fascinante
Realmente Fascinante
 

Semelhante a RemoteExec DataSheet

RemoteExec Presentation
RemoteExec PresentationRemoteExec Presentation
RemoteExec PresentationIS Decisions
 
Software Deployment by DeskCenter USA
Software Deployment by DeskCenter USASoftware Deployment by DeskCenter USA
Software Deployment by DeskCenter USADeskCenter USA Inc.
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_engatompark2
 
Bigfix Lifecycle - Reduce Cost, Risk of Managing Endpoints
Bigfix Lifecycle - Reduce Cost, Risk of Managing EndpointsBigfix Lifecycle - Reduce Cost, Risk of Managing Endpoints
Bigfix Lifecycle - Reduce Cost, Risk of Managing EndpointsHCLSoftware
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationJose Bittencourt
 
Remote administration
Remote administrationRemote administration
Remote administrationSuja Ritha
 
remote desktop_control-by_shubhham_patel
 remote desktop_control-by_shubhham_patel remote desktop_control-by_shubhham_patel
remote desktop_control-by_shubhham_patelShubham Patel
 
Managed desktop and infrastructure
Managed desktop and infrastructureManaged desktop and infrastructure
Managed desktop and infrastructureBlink Communications
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoringIAEME Publication
 
Operating system education. technology.
Operating system education.  technology.Operating system education.  technology.
Operating system education. technology.DevarajuBn
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone pptLaxman Puri
 
Servicenow it management tools
Servicenow it management toolsServicenow it management tools
Servicenow it management toolsveeracynixit
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentationdesktopalert
 

Semelhante a RemoteExec DataSheet (20)

RemoteExec Presentation
RemoteExec PresentationRemoteExec Presentation
RemoteExec Presentation
 
Network Monitoring
Network MonitoringNetwork Monitoring
Network Monitoring
 
Network Monitoring
Network MonitoringNetwork Monitoring
Network Monitoring
 
Software Deployment by DeskCenter USA
Software Deployment by DeskCenter USASoftware Deployment by DeskCenter USA
Software Deployment by DeskCenter USA
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_eng
 
Bigfix Lifecycle - Reduce Cost, Risk of Managing Endpoints
Bigfix Lifecycle - Reduce Cost, Risk of Managing EndpointsBigfix Lifecycle - Reduce Cost, Risk of Managing Endpoints
Bigfix Lifecycle - Reduce Cost, Risk of Managing Endpoints
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
 
Suresh D
Suresh DSuresh D
Suresh D
 
Remote administration
Remote administrationRemote administration
Remote administration
 
remote desktop_control-by_shubhham_patel
 remote desktop_control-by_shubhham_patel remote desktop_control-by_shubhham_patel
remote desktop_control-by_shubhham_patel
 
E-GEN
E-GENE-GEN
E-GEN
 
Managed desktop and infrastructure
Managed desktop and infrastructureManaged desktop and infrastructure
Managed desktop and infrastructure
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
 
Operating system education. technology.
Operating system education.  technology.Operating system education.  technology.
Operating system education. technology.
 
Remote access from a smartphone ppt
Remote access from a smartphone pptRemote access from a smartphone ppt
Remote access from a smartphone ppt
 
MBESDatasheet
MBESDatasheetMBESDatasheet
MBESDatasheet
 
Servicenow it management tools
Servicenow it management toolsServicenow it management tools
Servicenow it management tools
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentation
 

Mais de IS Decisions

Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsIS Decisions
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical PresentationIS Decisions
 
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions
 
Mitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial SectorMitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial SectorIS Decisions
 
Windows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic DepartmentWindows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic DepartmentIS Decisions
 
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of CyprusRisk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of CyprusIS Decisions
 
Windows Active Directory Security with IS Decisions
Windows Active Directory Security with IS DecisionsWindows Active Directory Security with IS Decisions
Windows Active Directory Security with IS DecisionsIS Decisions
 
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...IS Decisions
 
School Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudySchool Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudyIS Decisions
 
Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockInformation Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockIS Decisions
 
FileAudit Presentation | Windows File System Auditing
FileAudit Presentation  | Windows File System AuditingFileAudit Presentation  | Windows File System Auditing
FileAudit Presentation | Windows File System AuditingIS Decisions
 
UserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows NetworksUserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows NetworksIS Decisions
 
FileAudit Datasheet
FileAudit DatasheetFileAudit Datasheet
FileAudit DatasheetIS Decisions
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock DatasheetIS Decisions
 
8 Holes in Windows Login Controls
8 Holes in Windows Login Controls8 Holes in Windows Login Controls
8 Holes in Windows Login ControlsIS Decisions
 
IS Decisions in the NUMB3RS
IS Decisions in the NUMB3RSIS Decisions in the NUMB3RS
IS Decisions in the NUMB3RSIS Decisions
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions
 
WinReporter Presentation
WinReporter PresentationWinReporter Presentation
WinReporter PresentationIS Decisions
 

Mais de IS Decisions (18)

Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
 
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.
 
Mitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial SectorMitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial Sector
 
Windows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic DepartmentWindows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic Department
 
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of CyprusRisk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
 
Windows Active Directory Security with IS Decisions
Windows Active Directory Security with IS DecisionsWindows Active Directory Security with IS Decisions
Windows Active Directory Security with IS Decisions
 
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
 
School Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudySchool Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case Study
 
Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockInformation Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLock
 
FileAudit Presentation | Windows File System Auditing
FileAudit Presentation  | Windows File System AuditingFileAudit Presentation  | Windows File System Auditing
FileAudit Presentation | Windows File System Auditing
 
UserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows NetworksUserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows Networks
 
FileAudit Datasheet
FileAudit DatasheetFileAudit Datasheet
FileAudit Datasheet
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock Datasheet
 
8 Holes in Windows Login Controls
8 Holes in Windows Login Controls8 Holes in Windows Login Controls
8 Holes in Windows Login Controls
 
IS Decisions in the NUMB3RS
IS Decisions in the NUMB3RSIS Decisions in the NUMB3RS
IS Decisions in the NUMB3RS
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company Presentation
 
WinReporter Presentation
WinReporter PresentationWinReporter Presentation
WinReporter Presentation
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

RemoteExec DataSheet

  • 1. RemoteExec ® Enterprise-wide remote installations, updates and executions. RemoteExec offers IT professionals a feature-rich, enterprise software solution that facilitates and automates tasks associated with remote installations. The challenge Application deployment and Windows systems updating can be cumbersome and time consuming tasks without the help provided by efficient tools. Managing servers and workstations on Windows system across a network can be made far easier by automating, scheduling and performing such tasks remotely which might otherwise require a desk visit or time spent after working hours. The solution As a single interface for all remote deployment and execution, RemoteExec safeguards the Windows infrastructure by minimizing the response time, workload and risk involved with emergency application deployments, updates and patches. A fully agentless solution, it is fast and easy to install, simple to use and totally non-intrusive. An integrated scanner collects system configuration information to launch conditional executions, actions with multiple steps can be grouped together into one single task for execution and disruptive interventions are eliminated by scheduling deployments outside of working hours. Once finished any failed actions are automatically rerun to complete the task. From a user friendly GUI, monitor the progress of deployments, get instantly informed of results and quickly support end-users by completing Windows Administration tasks remotely. Key Benefits Centralized, single point for controlling, managing and reporting on all remote de- ployment and execution Perform executions on thousands of re- mote systems in minutes Significantly speed up and reduce worklo- ad when updating Windows Systems Minimize security risks by reacting instant- ly to emergency situations (from zero-day vulnerability that requires applying a patch, to an executive’s request for a spe- cific application) Eliminate all disruptive interventions du- ring working hours with advanced sche- duling. Silently perform remote executions in the background Quickly support end-users by completing Windows Administration tasks remotely About IS Decisions IS Decisions is a global software company specializing in Security & Access Management solutions for Microsoft Windows and Active Directory. More than 3,000 customers around the world rely on IS Decisions software and include:
  • 2. RemoteExec ® Enterprise-wide remote installations, updates and executions. Remote Application Deployment Easily deploy or schedule MSI packages, Service Packs, updates, patches and hotfixes to all required Windows systems. Remote File Execution Remotely execute programs (.exe, .bat, .cmd), scripts (.vbs, .js), and associated files (.txt, .doc, .wav, .reg, .inf, .msi…) or schedule them for a later date or time. Remote PC Interaction Automatically and remotely power off, reboot or shutdown systems, wake up PCs equipped with Wake-On-LAN technology and lock or close user sessions. Remote Configuration Management Registry Updates Registry modifications or updates can be made on Windows Sys- tems throughout the network, or of a specific subset of computers. File Management Deploy a file or the content of a whole folder across many computers. Update or delete a specified file or folder on Windows systems of your choice throughout the network. Password & local account management Remotely change the local administrator password on many computers and disable all other local accounts in order to reinforce security. Ease of Use & Enterprise Value www.isdecisions.com | info@isdecisions.com Technopôle IZARBEL - Créaticité Bât. A BP12 - 64210 Bidart - FRANCE Phone: +335.59.41.42.20 - Fax: +335.59.41.42.21 Schedule deployments to workstations outside of working hours or to automatically rerun previously failed actions due to system unavailability (unconnected laptops, etc.). Schedule all Remote Actions RemoteExec automatically provides success or failure reporting for any job it executes. That list can be directly reinserted to rerun the execution and complete the task. Manage and Report on all Remote Actions RemoteExec can send instant alerts to users by displaying pop-ups and/or running sound files, enabling administrators to warn of any upcoming downtime or maintenance event Send User Alerts RemoteExec can be used to silently perform remote executions in background, or can launch interactive executions displaying information to the user and requiring their interaction. Launch Silent or Interactive Executions RemoteExec can also be used via the command line mode and be invoked by a script or any automation tool if needed. Command Line Mode RemoteExec is an agentless, encrypted solution that only requires ICMP (ping) and Microsoft File and Printer Sharing (SMB TCP 445). Agentless, Non-intrusive & Secure Save remote action configurations and lists of target computers and reuse them for future tasks. Create and Reuse Customized Lists RemoteExec is equipped with a mini scanner to allow system configuration information to be collected remotely and used for conditional executions: OS version, OS level (server/workstation), Service Pack, etc… Launch Conditional Executions Group together actions with multiple steps into one single task for execution. E.g. Use Wake on LAN to turn a target PC on > Deployment of one or more patches > File and folder replication > Registry modification > System power off Group Multi Action Events