资费 Partnership 文件

Self-Hosted Remote Desktop Software for Enterprise Clients

When SaaS platforms can meet the performance requirements of your company’s demanding workloads, and cloud-based solutions are not viable, it may be time to explore an on-premise alternative.

Achieve fast, secure, and reliable remote access, control, and support across any device with confidence. Getscreen.me is a powerful and versatile tool that offers both unattended, anytime access and on-demand, attended connections, making it the perfect solution for all your remote access needs.

DEMO REQUEST SEE DOCS
CUSTOM PRICING
Available only for business customers.

How It Works

The system is composed of a central server and multiple autonomous components, including web servers, each dedicated to performing specific tasks.

This system includes multiple components to optimize functionality:

  • the server manages user accounts, agent connections, and registrations;
  • the download feature supports version storage and branded distributions;
  • the image solution handles image uploads for dashboards;
  • storage manages video session recordings and transcoding; and the proxy ensures seamless communication when P2P is unavailable.

A PostgreSQL database (version 14) is included by default for data storage but can be replaced with compatible software.

Minimum System Requirements

To run the system, a virtual machine must meet the following specifications:
OS
Debian/Ubuntu
RAM
8 GB
HDD
32 GB
CPU
4 cores

Easy Deployment & Hassle-Free Maintenance

Deploy and manage your remote access infrastructure with ease using a quick Docker-based setup, automated SSL certificates for secure connections, and seamless scalability with TURN network support. Real-time system health monitoring and offline local network operation ensure reliability. Regular updates keep your server and agents optimized for enterprise needs.
Quick Setup with Docker: Get up and running in minutes with streamlined installation.
Resource Monitoring: Independent monitoring of system performance and resource utilization
Automated Free SSL Certificate: Guarantee secure connections with hassle-free, automatic SSL provisioning.
Offline Deployment: Operate securely within your local network without Internet access.
TURN Network Scalability: Enhance connection quality with an adaptable TURN server network.
Consistent Updates: Regular updates for both server and agent software keep your system optimized.

Boost Speed and Connection Quality

Take your enterprise's remote access performance to the next level by deploying servers within your company’s network or region, you’ll achieve lightning-fast connections and unmatched reliability.
Geographically Optimized Deployment: Locate servers close to your clients and operators regions for faster response times and near-instant data transfer.
Scalable TURN Server Architecture: Add additional TURN servers to enhance performance and ensure redundancy, even when direct peer-to-peer connections fail. This will help maintain a high-quality and reliable connection.

OEM Integration with Your Systems

Seamless cloud integrations designed to enhance your workflow. Getscreen.me stands out with unmatched integration features built for cloud environments, ensuring flawless performance within your existing system.
HTTP API: Integrate remote access into your apps with ease. Install our agent on user devices and link it to their accounts. Use our HTTP API to generate a connection link and add it to your dashboard.
iFrame Connection: Embed remote sessions into your web portals. Open the connection window in a separate tab or integrate it into HTML or JavaScript systems (like ReactJS, VueJS) with an iFrame.

Advanced Security Customization

Secure your remote access environment with customizable, enterprise-grade features for complete peace of mind. Getscreen.me provides robust security features, including encryption settings, enforced protocols, secure login options, and multi-factor authentication for enhanced protection. With browser restrictions and measures to block anonymous connections, your organization remains safe and dependable.
Customizable Ports & TLS Encryption: Tailor your security configurations to meet internal policies.
CAPTCHA-Enabled Login: Protect access to personal accounts.
IP Whitelisting & MFA: Enhance user authentication with multi-factor options via Auth apps or Telegram.
Enforce Secure Protocols: Enable HTTP Strict Transport Security (HSTS) for enhanced security.
Implement Content Security Policies: Configure a robust Content Security Policy (CSP) for your personal account and connection pages to safeguard against potential threats.
Password Policies: Enforce expiration dates and mandatory password changes.
Browser Restrictions: Block outdated or vulnerable browser versions.
Anonymous Connection Prevention: Prohibit connections without user identification.

Streamlined Management

Optimize user management with versatile onboarding solutions that ensure secure and seamless access for your team. Streamline workforce setup through efficient mass deployment across your organization, saving time and resources while preserving operational efficiency.
Easy User Onboarding: Effortlessly invite users via email or add them manually.
Streamlined Integration: Import users with ease through SSO or LDAP.
Mass Agent Deployment: Simplify agent program distribution across your organization.
DEMO REQUEST

Data Access Control

Protect sensitive information by restricting access to critical data, like financial records, customer details, business strategies, and other confidential materials. Limiting access helps enhance security and maintain confidentiality.
Video Recordings and Agent Previews: Stay vigilant against suspicious activity with saved connection recordings and preview insights, accessible through the agent app.
History Connections: Keep track of which users have accessed sensitive data and at what time.
Chat History: Maintain secure and private records of all communications.
DEMO REQUEST

Branding – Build Trust and Foster Loyalty

Branding customizes software interfaces to match your corporate identity. Adding your logo and name to customer invitations and agent files builds trust and loyalty in the software.
Title: Filename shown up to 30 characters in the program window header, tray menu, desktop shortcut, and browser connection page.
Icon: Learn to create a .ico file with tools like favicon.io and see where it appears, such as the file icon, taskbar, and browser favicon.
Subdomain: Create custom connection links (3-25 Latin characters) for quick access in the agent program and permanent links in your account.
Personal Domain (CNAME): Learn to set up a custom domain by configuring your DNS server and personal account with this CNAME setup guide.
DEMO REQUEST

The Perfect On-Premise Solution Designed for Enterprise Needs

For organizations in industries like IT support, healthcare, finance, education, and more, our self-hosted edition of Getscreen.me offers unparalleled customization, scalability, and security. Empower your teams with the tools they need to deliver seamless remote access while maintaining complete control over your infrastructure.
IT & Managed Services
Healthcare
Finance
Education
Government & Defense
Manage devices securely and efficiently across your enterprise

Boost your IT services with secure, scalable, and highly customizable remote access. Manage devices, resolve issues, and support clients effortlessly while maintaining complete control over your infrastructure

LEARN MORE
Remote Device Management: Support and manage client devices, servers, and networks with secure access anytime.
Troubleshooting & Maintenance: Diagnose and fix issues without requiring on-site visits, saving time and reducing costs.
Self-hosted Environment: Total control over data and infrastructure eliminates dependency on external servers, addressing privacy concerns.
Scalable Architecture: Easy to scale for growing client bases.
Resource Management: Optimize system performance and prevent overload during peak usage.
Enable secure access to patient data without compromising compliance.

Ensure patient data security and compliance with tailored remote access solutions. Enable streamline medical equipment management, and provide efficient, secure collaboration for healthcare professionals.

LEARN MORE
Device Monitoring: Manage and monitor medical equipment in real-time.
Secure Collaboration: Facilitate remote consultations between specialists.
Data Sovereignty: Self-hosted deployment ensures that data never leaves the organization’s controlled environment.
High Reliability: Local TURN servers ensure uninterrupted access even during internet outages.
Customization: Tailor the system to meet specific healthcare workflows.
Protect critical systems and ensure uninterrupted client service.

Empower your financial operations with secure remote access. Protect sensitive data, ensure compliance, and maintain business continuity with solutions designed for high-security industries.

Secure Data Access: Enable employees to access financial systems securely from anywhere.
Fraud Monitoring: Provide secure remote access for compliance officers to review and investigate systems.
Disaster Recovery: Maintain operations during disruptions by enabling secure remote access.
Advanced Encryption: Automated SSL certificates and robust encryption protect sensitive data.
Access Controls: Integrate with SSO/LDAP to enforce strict user authentication.
Local Network Access: Limit access to internal networks to prevent data leaks.
Connect staff and students across campuses with reliable resource access.

Facilitate secure remote learning and IT support for educational institutions. Keep student data private, reduce costs, and ensure uninterrupted access to essential resources.

LEARN MORE
Remote Learning: Allow staff and students secure access to campus resources from anywhere.
IT Support: Troubleshoot and maintain devices for remote learners.
Collaborative Tools: Enable secure screen sharing and presentations.
Cost-Effective Deployment: Bulk agent installation reduces setup costs.
Privacy Compliance: Fully self-hosted solutions keep student data on-campus.
Turn-Key Scalability: Easily manage access for thousands of users across departments.
Conduct sensitive operations in a controlled environment.

Protect national interests with fully self-hosted remote access. Manage critical infrastructure, ensure disaster preparedness, and maintain control over sensitive operations with unmatched security and performance.

Secure Operations: Access classified systems in a controlled and auditable manner.
Critical Infrastructure Management: Remotely monitor and maintain government assets like servers and networks.
Disaster Preparedness: Enable secure remote access for continuity during emergencies.
Local Hosting: Full control over data, ensuring compliance with national security standards.
High Performance: TURN servers optimize speed and quality of connections.
Integration: Seamlessly integrate with legacy systems without disruptions.

Customer Success Story

Start Your Business Trial Today

Take your product to the next level by integrating our seamless remote desktop software
Free for 14 Days
Access to all features
No card required
SIGN UP TO START

Useful Materials

Guide to Setting Up SAML SSO

Learn how to set up SAML SSO with this step-by-step guide. Simplify secure access for your users and streamline authentication.
Find Out
5 min

Deploying Agents at Scale Using Group Policy Objects (GPO)

Learn how to deploy agents at scale efficiently using Group Policy Objects (GPO) to streamline management across your organization.
Find Out
5 min

Active Directory Integration

Seamlessly connect and manage user accounts with Active Directory Integration for streamlined access and enhanced security.
Find Out
5 min

Boost your customer service speed with the Chrome extension

Enhance your customer service efficiency with our powerful Chrome extension. Respond faster and streamline support today!
Find Out
5 min
Learn All

FAQs

What is the Self-Hosted Server version of the system?
The Self-Hosted Server version of Getscreen.me allows you to host the software on your own infrastructure. It includes all necessary server components for self-hosting, enabling remote access within a local network—even without an internet connection. Learn more.
What are the system requirements?

To run the Self-Hosted version, you’ll need a virtual machine with the following specifications:

  • Operating system: Debian/Ubuntu (recommended: Ubuntu 22.04 or Debian 11)
  • RAM: 8 GB
  • Disk space: 32 GB
  • CPU: 4 cores
  • Learn more
What responsibilities do companies have when operating the system?

When using the Self-Hosted version, companies must manage and monitor the following:

  • Monitor hardware resource utilization (CPU, RAM, disk space)
  • Resolve resource overloads or upgrade hardware when needed
  • Secure the server OS from unauthorized access
  • Protect the system against DDoS attacks
  • Regularly back up data
  • Update the system with new releases from the developer
  • Manage old log files (deletion or transfer)
  • Learn more
What are the main steps to install the Self-Hosted version?

Installing the system involves several steps:

  1. Download the image
  2. Obtain a certificate (e.g., Let's Encrypt)
  3. Configure the SMTP server
  4. Launch the system
  5. Check for errors
  6. Verify web server availability
  7. Learn more