Viewfinity Systems Management
Viewfinity provides a systems management solution that immediately allows IT to offer cost-effective IT support,
management and control for its in-house and mobile workforce. All laptops and desktops are managed at
the application-level, and our platform architecture manages both mobile and on-network computers using
only an internet connection (secure and encrypted).
Viewfinity can be implemented as an on-premise platform or you may elect to use our
cloud delivery platform,
saving you the time and expense of building an in-house infrastructure.
Viewfinity Systems Management Suite:
Get started today and try the product for free
In four easy steps and in less than ten minutes, the software can be installed and ready for evaluation.
Viewfinity is making companies more productive and more profitable immediately, by supplementing or replacing
traditional systems management with no specialized IT experience required and no need to
purchase and install a management platform and server.
Viewfinity Support for Delegated Security
The Viewfinity Privilege Management solution provides granular delegated management control to support the needs of various IT roles and staff members. The primary Viewfinity Server Administrator account has authorization to manage all computers in the organization. This primary account can create separate computer subsets based on departments, regions, and other user definable criteria and assign management control of these subsets to specific individuals. Each subset administrator can deploy agents, apply policies, and report on computers which fall under his/her management.
Viewfinity Privilege Management Platform supports multiple customized levels of management console access. "Full Control" systems management accounts have complete access to product features such as the ability to create, stop, start, and modify policies; deploy agents and monitor activity. "View only" accounts are targeted for subset administrators which require "review only access" to activities such as viewing reports and monitoring policy and asset management reports, reviewing computer connectivity status, etc.
In addition, custom Roles can be created to provide specific individuals or a group with various access capabilities according to their business needs. Dozens of various capabilities can be configured for an Administrator.