Jump to:
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15 
arrow image

/ 15

arrow image

Learning Center   

rep

Contact Us

rep

Sales Support

678-580-6455

Technical Support

678-735-7432

email envelope

Send us a message

Company Directory »

ThinManager ®

Relevance

for Users

pdf icon

Securely deliver content through
user/role-based management.

With Relevance for users, an administrator can control user access with a ThinManager username and password. Set up permission groups so that whereever users go, their applications follow.

SERVE AND PROTECT

As a user moves from client to client, Relevance logs them in and instantly reconnects to the existing terminal server sessions and virtual desktops while programs follow and instantly appear on screen, ready to use. When the user walks away, they are automatically logged out and the client returns to its original function.

AUTHENTICATE

Identify yourself at a Relevance enabled device using an RFID proximity card (short or long range), a USB flash key, or login manually. Combine authentication methods and greatly increase security.

CONTROL

Administrators control user access to terminals and applications through group permissions and terminal scheduling. Limit a specific user to a weekly, daily or hourly schedule or disable the terminal itself at any time you choose.

EXTEND

Drop our ActiveX control into your applications and you can program in terminal and user specific functionality, including session switching, event logging, and terminal status and management.

SAVE

Prevent a single unauthorized access to your systems and you might also be preventing a downtime event that more than pays for this software. Save a minute or more each time you access applications from a client over the life of your systems and now you have money in the bank.

BioMetric Print
BIOMETRIC SECURITY

ThinManager supports biometric security integration for fingerprint recognition devices. Add yet another level of security by having operators, users and administrators scan their finger to have access to a specific set of applications.

term secure pic
user control image
server control image
© 2024 Rockwell Automation, Inc.

↓  MENU  ↓