Raul Ortiz

Remote Software Installation with Goverlan!

Remote Software Installation with Goverlan One major feature of any configuration management system is to perform a remote software installation. With Goverlan you can push EXE or MSI software packages to your computers in minutes with just a few clicks.  Simply configure a Goverlan installation package, assign it to a computer and execute. Goverlan installation [...]

What is SUREDATA and why is it important to Remote Management?

What exactly is SUREDATA and how does it help me with Remote Management? Goverlan SUREDATA is designed to close the gap between database driven Configuration Management Systems and Real Time Remote Management Systems. Now you do not have to sacrifice the availability of the database driven system like Microsoft System Center Configuration Manager and the [...]

A comparison of remote monitoring and configuration management tools for Windows-based networks:

Concentrated Technology compares popular remote monitoring and configuration management tools   The following products were compared: Dameware Remote Support v9 Dell Desktop Authority Standard 9 Goverlan Remote Administration Suite v7 Symantec Client Mgmt Suite 7.5 Concentrated Technology examined several functional areas: Architecture User and Desktop Management and Support Core System Config / Monitoring Capabilities Batch [...]

Goverlan Remote Control Software Text and Image Customization

Goverlan Remote Control Software Provides Customized Branding Can you customize the text and a corporate logo displayed on the client machines during a remote control session? With Goverlan Remote Control, you can: Customize the text displayed. Localize the text in different languages. Add your logo so clients know who is remote controlling them. Add your [...]

Identifying Computers infected with the CryptoLocker ransomware virus (Crilock.A).

CryptoLocker Ransomware Virus CryptoLocker, also known as Trojan:Win32/Crilock.A, is ransomware that will encrypt files on your local disk or on any mapped shared folder attached to your computer. This message will actually instruct you to pay a ransom in order to decrypt your files. Once a system is infected, you will see a countdown like [...]