A Fully Managed Web-based Remote Access VPN Service For Small And Medium Businesses

About UsHow SecureHow It WorksComparisonsVPN Pricing

AccessAnywhere VPN vs GoToMyPC

Faster, More Secure and More Capability

A fundamental difference between a service like GoToMyPC and AccessAnywhere is the access point. GoToMyPC requires a desktop PC at the office that the remote user can take control of. More importantly, all of the data and files that you access remotely is proxied through a GoToMyPC server that you don't know anything about. How secure is it? What do they log? And who's watching what you do?

With AccessAnywhere all communications between the remote user and your company network is point-to-point through your private and dedicated AccessAnywhere Remote Access Platform. No data or files are ever proxied through our network or servers so you never have to worry about how secure our operation is or wonder what confidential transactions are visible to outsiders.

Also, GoToMyPC only provides "remote control", which means that someone in the office cannot use that computer at the same time. AccessAnywhere on the other-hand, provides a true network-level connection to remote users, just like a virtual network cable connecting their computer to your network.

AccessAnywhere Features and Benefits

Windows Drive Mapping
Directly map a Windows shared folder to your remote PC and work directly on your office files, as if they were local to your PC.

Remote Desktop Control
Fully control the mouse and keyboard of your office PC, just like you were there.

Multi-User File Sharing
Easily share files - like an database - simultaneously with other remote users, without locking up the office desktop.

Non-Windows File Access
Securely access, transfer and backup important files to/from Macs, Unix, Linux and Netware servers.

Client/Server Connections
Directly connect client applications to your back-office servers. Ideal for e-mail, database, terminal emulation

Web Content Access
Publish web-based content like HR manuals or price lists that only authorized users can access without the hassle of setting up a secure web server.

Remote users no longer need to leave their office PC "on and vulnerable" to the Internet.

With GoToMyPC you must download and install a software agent on the remote computer and ensure that the remote computer has an "always-on" connection to the Internet.

Gartner views these user-installable Web-based remote control tools as medium to high risk for a companies perimeter security. As Gartner explains in their research report entitled "Use Gartners Remote Control Decision Framework to Protect Your Perimeter Security", "Most companies don't monitor the presence of these tools or how they're used. Ad hoc tools have security to pretect the individual, but there are few safeguards to protect the company. For example, if the user's remote PC is infected with a key logger, then company security could be compromised with no simple way of detecting the breach or subsequent attacks.

New York TimesIn August of 2003, the New York Times reported a story about a man who had installed keystroke logging software on Internet terminals at Kinko's copy stores around New York City. According to the report, the man harvested personal information on 450 people including the stolen password of one victim that was used to access the GoToMyPC service and control an online payment transfer service. The "always-on" desktop feature of GoToMyPC facilitated the access point for the criminal and allowed the actual user to watch his funds transfer out of his account right before his eyes.

With AccessAnywhere remote users do not need to leave their office desktop "always on" and exposed to the Internet to be connected to the data and information they need to do their job remotely. Remote users don't have to worry about the privacy issues of who's watching their office desktop when their not in the office or be concerned about hackers using our service to facilitate criminal transactions.

AccessAnywhere's "one-time random number passwords" render a stolen password useless.

HomepagePrivacy PolicyTop of Page