Remote Desktop Software: Review

Remote desktop software is a linchpin for any IT department, so it's no wonder there's a wide range of products on offer to cater for different requirements and environments. And this only has become more integral over time as teleworking and the plethora of mobile devices has taken off. In many cases, an employee's job depends on being able to remotely access data at work, via secure shares, VPNs, or remote desktop software.

But what features do they offer, and are they secure? When it comes to remote management, accessing servers in other offices and locations, or allowing employees to work remotely you want to be sure the connection isn't the weakest link, especially if a VPN isn't an option. And even if a VPN is available, this isn't always the best choice -- for remote employees, the extra overhead can be counter-productive if routing internet access, and more importantly can expose the network to the outside. Remote desktop software can help alleviate this by allowing employees to access the corporate network without necessarily being able to copy data out.

Most all remote desktop will (or should) utilise encryption, but not all products are created equal. Different levels of encryption are available, some may add extra security with two-factor authentication, and others still may route traffic through a central server -- which may or not be a good thing depending how you look at it. Doing so can make it easy to connect machines without opening ports in a firewall, but it means you rely on a third party both for access and trusting your data remains secure.

Feature wise you'll find everything from just basic remote desktop support through to clipboard and file transfer facilities, access to remote devices (like cameras), accelerated 3D support, and mobile clients (iOS, Android et al.) And on top of this there is of course a wide range of paid and free products, including the built-in functionality one can find in Windows, Linux, and MacOS X.

We can't cover them all, but here's our take on some of the more popular and less well-known products on the market. As always, give them a whirl with a trial before you buy and ensure they meet your own strict security policies.

1. Remote Utilities

2. Teamviewer

3. NoMachine

4. Splashtop

5. GoToMyPC

6. LogMeIn

7. AnyDesk


RDP and VNC?

RDP, aka Remote Desktop Protocol, is the Microsoft protocol for remote desktop functionality and is utilised by many remote desktop software suites. Similarly, VNC is the Virtual Networking Computing protocol (also RFB, Remote Framebuffer protocol) that originated on Unix and, for this reason, many Linux-based remote desktop programs utilise it.

Where RDP supports encryption natively, the same is not true for VNC. Typically, many free remote desktop programs on Linux are front-ends to VNC and often also do not provide encryption --- instead, these are frequently used in conjunction with an SSH tunnel to provide security. Commercial VNC-based products however should provide encryption without the need for an SSH tunnel, given their business focus.

That said, protocols are just that -- protocols -- and you will find both Windows and Linux tools that can use both RDP and VNC, making it possible for two machines to connect even if they use different remote desktop server and client software and different operating systems, just as long as the same protocol is used.

Alternatively, some of the tools we looked at here incorporate their own proprietary protocol, and may provide RDP or VNC as options or fall-backs. In these cases, software from the vendor is needed on both sides to honour the proprietary protocol.

In general, performance of RDP and VNC falls behind some of the newer tools with their own protocols, at least when it comes to higher-latency connections over the internet as opposed to a LAN. However, there are various free tools available that use RDP or VNC, and you may find these meet your needs.


Join the CSO newsletter!

Error: Please check your email address.

Tags RDPTeamviewerAnyDeskGoToMyPClogmeinRemoteDesktop SoftwarereviewSplashtopVNCRemote UtilitiesNoMachine

More about AVCCitrixGoToMyPCLANLinuxLogMeInMicrosoftSplashtopSSH

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Ashton Mills

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place