iTivity is comprised of three components: the iServer, the iManager and the iAgent. The iServer acts as the connection broker between the technician and the remote system. Techicians access the remote system using the iManager. The iManager has a familiar “explorer” type interface that makes it very easy to find and access remote systems. The iAgent is installed on the remote systems and makes the outbound connection back to the iServer. This eliminates the need to open firewall ports, greatly improving security.
Premise-based or Hosted
The iServer can be hosted either at your premises or by Tridia, you decide. There is a cost savings by hosting the iServer at premises. Tridia can also host a back-up iServer to insure your access to customer systems.
Click the links below to learn more about iTivity’s features:
- Remote Control
Take control of any system regardless of operating system.
Most remote support solutions allow you to remote control Windows PCs. A few Linux systems. Only one allows you to remotely control Windows, Linux and even UNIX systems. Remote control is the backbone of any help desk. iTivity makes sure you don’t have to compromise by allowing you to access any system. iTivity supports full remote control of Windows desktops, Terminal Services and RDP sessions, X Windows, even SSH and Telnet sessions. No other solution comes close.
- Access Control
Control access to systems and devices by user or by groups.
iTivity supports all common authentication services including Active Directory, NTLM, LDAP, and PAM. This allows you to integrate iTivity seamlessly into your IT environment.
iTivity also provides Support Domains. Support Domains allow you to define groups and place computers and devices into those groups. For example, you can create the Support Domains for: Accounting, Management, Sales, and Manufacturing. Only users registered in a specific Support Domain can access the computers in that Domain. Users can be a part of more than one Support Domain. Support Domains provide an extra layer of control allowing you to better manage user access.
- File Transfer
Cross-platform file transfer makes system admin and maintenance easy.
iTivity allows you to transfer files to and from any system or devices connected to the iTivity server regardless of operating system. For example, if you need to pull a log down from a Linux server from your Windows PC, not a problem. iTivity provides a simple drag-and-drop interface for file transfer. Grab the files(s) you need, or push out the files to any remote system. Since file transfer operates within the iTivity access control, it insures maximum security and compliance.
Access systems 24/7, or only with end user permission.
iTivity iAgents can be configured to require end user permission when access is desired. This is known as an attended iAgent. Attended iAgents will display a confirmation window on the end user’s screen whenever an iTivity technician requests access. The end user can approve or deny the access request.
iTivity iAgents can also be configured to not prompt for access permission. This will allow the iTivity technician access to the remote system as needed. This is typically required for access to servers.
All data and interaction is protected with highly secure 128-bit AES symmetric encryption.
Unlike other remote support solutions that require you to take care of the security of the data, iTivity encrypts all interaction, including logging in. No data is ever sent unencrypted. When an iAgent makes a connection to the iTivity server, the very first step is to negotiate an encrypted connection. Using the highly secure 128-bit AES symmetric encryption and TLS/SSL, iTivity creates a virtually impenetrable “tunnel” between you and the remote computer. This allows you to use iTivity over the Internet with peace of mind knowing your data is secure.
The most comprehensive Linux support on the planet.
Supporting Linux is much more than just porting to the most common Linux distros and calling it good. Anyone can do that. Supporting Linux means designing and building a product that meets the unique needs of administering and supporting Linux systems. iTivity has its roots in Linux having been designed and built by a company that has been developing Linux-based remote access and support solutions for over 15 years. No other company can claim that. And it shows in the product. The ease of installation, speed and responsiveness, and key features designed just for Linux make iTivity the absolute best solution for Linux administration and support.
iTivity supports all the common Linux distros including:
- Red Hat
Source code available for Linux iAgents.
Source code is available for our Linux iAgents. This allows you to support virtually any Linux environment in the market–even if it is your own custom distro, or non-Intel environment. Build your solution on iTivity and be assured that you can access it no matter what Linux you deploy.
- Public Keys and Commercial Certificates
iTivity supports public keys and commercial certificates to create a highly trusted environment.
Public/Private Key Encryption and PKI
iTivity provides standard public/private key encryption using TLS/SSL connections from the iAgent to the iServer and from the iManager to the iServer. By default, these connections use 2048-bit RSA key exchange with 128-bit AES symmetric key encryption. During a standard installation, the iServer will generate a custom private/public key pair for use when connecting to that iServer. Tridia’s web site provides custom installers that can deploy the public key with every iAgent and iManager to insure automatic recognition and trust of the iServer.
The iTivity iAgent and iManager installers deploy more than 100 root certificates from all well-known commercial certificate authorities (CAs). When the iServer is configured to use a commercial encryption certificate from any of these CAs, the iAgent and iManager systems will automatically recognize the iServer and establish a secure connection. In many cases, an existing commercial web server encryption certificate can also be used with the iServer.
- Software Appliance
Premised-based to provide maximum security and configurability
iTivity is delivered as a tightly integrated software-based solution. There is no expensive hardware to buy, configure, or maintain. Simply install the iTivity software appliance on your existing Windows or Linux-based hardware. iTivity can also be delivered as a VM for today’s cloud-based environment.
Since iTivity is installed in your environment, it is controlled by your security policies and access management systems. This provides the highest level of security and compliance.
- iTunnel Technology
Access any system, or any app
Installing iTivity’s iAgent creates an ultra-secure “tunnel” between you and the remote site. Install once and gain access to all the computers, devices and applications on the remote network. The tunnel is protected by state-of-the-art encryption technology for complete security and compliance. Access to tunnels are managed by existing authentication controls.
iTunnels can be used to gain access to any computer or device without having to install agent software on each system. When an iTunnel is created, it automatically displays in the iManager all available systems and devices. They can be remotely logged into and controlled using SSH or RDP depending on the environment.
Remote applications can be run locally using the iTunnel. iTivity comes preconfigured to support the most common web and system management applications, including:
- WebMin, UserMin, VirtualMin
- IBM Systems Director Console for AIX
- HP Insight Manager, System Management Homepage
- Solaris Management Console
- Dell Printer Configuration Web Tool
- SWAT – Samba Web Administration Tool
- Oracle VM Manager, Template Builder
- Cisco, 3Com, LinkSys, D-Link, Netgear router/firewall configuration
Automatic failover provides continuous access.
The iTivity remote access architecture provides fault tolerance against network outages as well as server system failures. You can setup multiple points of presence (POP) with geographically dispersed iServers to achieve extremely high availability in the face of both natural disasters and system failure. iTivity iAgents automatically failover to an available iServer when a connection is lost. iTivity can be hosted in the cloud providing additional flexibility and redundancy.
iTivity can grow to meet your needs–no matter how large.
iTivity licensing allows an unlimited number of iServers to be installed at no additional cost. This provides maximum scalability. Unlike hardware-based remote support appliances, the iTivity software-based appliance gives you much greater growth options–without lock-step growth in cost. Because iTivity is software-based, you can install it on your hardware and/or cloud architecture. You are not constrained by a vendor’s arbitrary hardware requirements. Build iTivity to meet your current needs and have the peace of mind knowing it can grow as your needs grow.
- Secure SSH
Access any Linux or UNIX system securely and with access controls.
iTivity includes our Java-based SSH emulator. This emulator is not some add-on afterthought. It is based on our Crosstie technology that has been used for years to access hundreds of thousands of Linux systems worldwide. It is robust and secure, and tightly integrated into iTivity, giving you the access controls that today’s compliance sensitive environments demand.
- Open API
Integrate iTivity quickly and seamlessly into any application.
iTivity provides an open API making it straightforward to integrate iTivity into other applications. Using command line options and scripting, you can automatically connect to remote systems, authenticate, and take control, all from your existing case tracking or CRM application. Since it does not require linking libraries, any application that can make external command line, or shell calls, can be integrated.
- Fully Configurable
Customize iTivity to your exact needs with over 100 configuration settings.
Unlike most remote support solutions, iTivity is highly configurable. Over 100 configuration settings allows you customize iTivity for your specific environment and workflow.
Here are the main configuration categories:
- Access and Permission
All installation scripts are fully customizable. This allows you to tweak the iTivity deployment to meet your specifications. Plus, you can create deployments to meet specific customer or end user needs. Since iTivity can be deployed using a simple web link, you can create one or more customized web pages to deploy iTivity for any situation or circumstance.
- User Interface Branding
Brand iTivity with your own company logo for total integration.
iTivity is the only solution that allows you to totally integrate remote support into your product, including the desktop icons and the user interface. Reduce customer confusion and increase brand awareness and loyalty by branding iTivity with your company logo.
- Automatic Reconnect
Insure you can always connect with automatic reconnect.
It’s a fact of life: network and Internet connections go down. So do computers. iTivity’s automatic reconnect feature uses sophisticated algorithms to make sure that each computer or device connected by iTivity stays connected. All you need to do is install the iAgent. iTivity takes it from there to insure that you can always connect.
- Flexible Licensing
iTivity provides licensing options to meet your specific needs and budget.
Most remote support solutions only offer one licensing option: the one most favorable to them. iTivity offers licensing options that are best for you. You can license iTivity either by the technican, or by the system. There are advantages to each. Per Tech licensing is great when you have a large number of remote systems. Whereas, Per System licensing is advantageous when you are rolling out systems over time, or if you wish to resell, or recoup the cost of providing remote support. Per System also offers the advantage of only having to pay the license fee one time.*
*Additional charges may apply for future upgrades.
Complete activity logging for security and compliance.
iTivity logs all activity including iAgent connections, all login attempts, and any interaction with remote systems. The logs are easily integrated with 3rd party log tracking software, such as Snare™. Automatic rotating of logs insures log data integrity.
- Cloud Support
Use iTivity to remotely support cloud-based systems and applications.
iTivity provides remote access to virtual machines (VMs) in the same way that it provides access to physical systems. Since the iAgent can establish an outbound connection from a physical system behind a firewall, it can also work with a VM running on an internal IP behind NAT. If your VM is setup for bridging, then the IP address and routing information from the DHCP server will also generally allow a connection across the Internet to the iServer.