Everything you need for secure endpoint access
Terminal, file transfer, live diagnostics, and session recording — built for privacy and scale.
Company Isolation
Users only see endpoints within their company. Access control is enforced across UI and API.
Token-based Registration
Agents register with a company token. Rotate tokens any time to invalidate old clients.
Browser Terminal
Open ephemeral, auditable terminal sessions without exposing sensitive tokens or opening inbound ports.
Multi-session Tabs
Open, rename, and switch between multiple live PTY sessions per endpoint with automatic reconnect.
File Browser & Transfers
Navigate directories with breadcrumbs, download large files, and upload securely right from the UI.
Live Diagnostics
View CPU, memory, disk, and network stats in real time to understand system health.
Session Recording & Playback
Automatic recordings with in‑app playback and secure downloads for audits.
Cross‑platform Agents
Linux, macOS, and Windows (ConPTY) supported. Respect system shells and term sizes.
Flexible Deployment & APIs
Self‑host the proxy on our Enterprise Plan. Protect agent and viewer APIs with shared secrets and JWT.
Hardware/Software Inventory
Automatic inventory snapshots (OS/arch, kernel/platform, CPU model, NICs, disks, IPs).
Tasks Across Endpoints
Run commands across selected endpoints with per‑target status. Great for checks and routine automation.
User management
Invite other users to securely share out-of-band access with short-lived tokens.