Top News

New feature: Password List credential entry in Remote Desktop Manager

Discover the new Password List credential entry feature in Remote Desktop Manager. Learn how to manage multiple usernames and passwords efficiently with this easy-to-use, secure access tool.

7-Cool-VR-Apps--Devolutions

7 Cool VR Apps to Check Out

Remember when the “next big thing” was HDTV? Well, these days HDTV is standard, and what everyone’s looking forward to is when (not if) Virtual Reality takes over and thrusts us into the action. I mea...

Sysadminotaur-#59-Doodle

Sysadminotaur #59 : Doodle

Improved Remote Desktop Manager Feature: Inventory Reports

Summer is here, which means folks are trying to look their best. Time to work out, diet, and get a new hairdo! Well, here at Devolutions, instead of working on our tan or hair, we’re hard at work maki...

Case-Study-visma-Remote-Desktop-Manager

[Customer Story] Visma IT&C Adopted Remote Desktop Manager To Manage Its 4000 Servers, Machines and Devices

“Remote Desktop Manager is an all-in-one tool and not just an RDP tool. It makes our work more efficient and easier.” - Paul Vilcu, System Administrator, Visma IT&C Client Snapshot: Visma IT&...

One time password in remote desktop manager devolutions

How to use One Time Password (OTP) in Remote Desktop Manager

Learn to enhance security with One Time Password (OTP) in Remote Desktop Manager. Follow our step-by-step guide to set up OTP and improve your authentication process with 2FA.

Data Source Permissions in Remote Desktop Manager

Over the last few weeks, we’ve been focusing on RDM’s role based security system and exploring the difference between roles and permissions set on entries. Today, we’ll look at a new feature: implemen...

Guest Blog: Remote Desktop Team Considerations

THIS ARTICLE IS PART OF A BLOG SERIES CREATED BY THE PETRI IT KNOWLEDGEBASE TEAM AND TECHNICAL WRITER MICHEAL OTEY, IN PARTNERSHIP WITH DEVOLUTIONS. In today’s corporate environment, IT administrator...

SecureSSH-Google-TwoFactor-Authentication

How to Secure SSH with Google Two-Factor Authentication

A few weeks ago we took a look at how to secure Open SSH in 10 steps, and one of those steps was how to secure SSH using Two-Factor Authentication. Well, since it is quite complex to set up, we’ve dec...

Guest Blog: Best Practices for Securing Remote Desktop Connections

THIS ARTICLE IS PART OF A BLOG SERIES CREATED BY THE PETRI IT KNOWLEDGEBASE TEAM AND TECHNICAL WRITER MICHEAL OTEY, IN PARTNERSHIP WITH DEVOLUTIONS. Windows Remote Desktop Connection is one of the ad...

sysadminotaur-#58-Legacy

Sysadminotaur #58 : Legacy

Should You Use RDM Jump or SSH Port Forwarding?

Should You Use Remote Desktop Manager Jump or SSH Port Forwarding?

There may be times you’re not sure whether to use RDM Jump or SSH port forwarding. I’ll admit that even I get confused sometimes! The easiest way to look at this is not as an “either/or” decision – be...

RDM for Windows vs. RDM for iOS

Recently, I looked at the differences between RDM for Windows and RDM for Android. But don’t worry, I haven’t forgotten all of you iPhone and iPad fans, because today we’ll be comparing RDM for Window...

Guest Blog: Five Essential Remote Desktop Tips

THIS ARTICLE IS PART OF A BLOG SERIES CREATED BY THE PETRI IT KNOWLEDGEBASE TEAM AND TECHNICAL WRITER MICHEAL OTEY, IN PARTNERSHIP WITH DEVOLUTIONS. Windows Remote Desktop Connection is the IT admini...

How Can Remote Desktop Manager Help You Become PCI Compliant

PCI DSS is an acronym for Payment Card Industry Data Security Standard. It’s a set of worldwide protection standards developed by major payment card companies, and it’s mandatory for businesses that s...

Case-Study-vmware-Remote-Desktop-Manager

[Customer Story] VMware Uses Remote Desktop Manager To Store Its Passwords in a Secure and Centralized Location

“Remote Desktop Manager is my favorite tool and I cannot imagine working without it.” – Anjani Kumar, VMware’s Cloud Implementation and Deployment Engineering Consultant Client Snapshot: VMware VMwar...

Secure open ssh tunnel

Top 10 steps to secure your OpenSSH: enhance server security

Discover the top 10 steps to secure your OpenSSH and protect your server from unauthorized access. Follow our comprehensive guide to enhance your server security today.

sysadminotaur-#57-Emergency

Sysadminotaur #57 : Emergency

Ssh tunnel putty remote desktop manager devolutions

Configure an SSH tunnel on PuTTY: step-by-step secure setup guide

Learn how to configure an SSH tunnel on PuTTY with our comprehensive guide. Enhance your secure connections and remote access with these detailed steps for optimal SSH setup.

April Poll: What PAM Software Do You Use & Recommend?

April Poll: What PAM Solution Do You Use & Recommend?

The beginning of April may be dominated by April Fool’s jokes, but for the poll this month we’re taking a more serious turn, because the topic is network security. Specifically, we’d like to know: wha...