Analyze and fix protocols.
Perform vulnerability scan and security analysis within your network.
Use the web via the protected VPN connection.
Monitor and track your Internet traffic history.
Anytime, anywhere secure access to your PC's files and applications.
Examine mailboxes of selected domain.
Manage any remote connections (RDP, FTP, VNC, ICA, SSH, HTTP) and passwords.
View and change your IP settings on PC.