Feature

Secure remote control of workstations

Medulla is a management solution that enables secure remote control of any workstation.

Request a demo

The remote control management solution allows IT teams to quickly intervene on any workstation in the fleet, regardless of its location. Thanks to an encrypted tunnel integrated into the Medulla agent, the connection can be established even outside the VPN or in a teleworking context. Administrators can view, interact with, and troubleshoot users in a fluid and traceable manner.

All actions are logged to ensure security and compliance. Available as SaaS, Private Cloud, or OnPremise, this open source solution adapts to the constraints of each structure and ensures total control of support flows. Medulla is already used on more than 100,000 workstations in sensitive, distributed, and secure environments.

How does it work?

How remote control works

Tester Medulla

Medulla > The steps

  1. The Medulla agent establishes a constant presence of the post in the interface.

  2. The administrator selects the workstation and starts the session.

  3. An encrypted tunnel is established via SSH or a secure proxy.

  4. An encrypted tunnel is established via SSH or a secure proxy.

  5. At the end of the session, the logs are saved and available in the history.

Secure remote control of workstations > The benefits of the solution

  • Real-time support, wherever the user is located

    Ideal for remote working, emergency, or distributed maintenance scenarios.

  • Enhanced security

    Ideal for remote working, emergency, or distributed maintenance scenarios.

  • Seamless integration into IT processes

    All connections are authenticated, encrypted, and logged for auditing purposes.

  • Ease of use

    Connection possible from the Computer, Ticket, or Group views in Medulla.

  • Open source and proven

    Over 100,000 active support positions via Medulla, with a controlled and scalable infrastructure.

Technical Specifications

  • Windows and Linux compatible agent
  • Secure tunnel via SSH, no VPN required
  • Works on local, remote, or DMZ networks
  • Session startup even offline (if Wake-on-LAN is active)
  • Console or graphical user session access
  • Connection tracking: time, duration, user ID, target machine
  • Exportable logs for audits or compliance
  • API integration with ITSM or ticketing systems
  • Deployment in SaaS, Private Cloud, or OnPremise
  • Compliant with ISO 27001, 27002, EUCS iPlus, SecNumCloud standards (not certified, currently being aligned)
  • Session data can be purged or archived according to the chosen policy