Skip to content

HTML5 Screen Shadowing Demo – NoTouch Desktop

Screen Shadowing

Take advantage of advanced, secure and flexible shadowing using NoTouch software.

Stratodesk software uses HTML5 to enable screen shadowing right from your browser without any third-party software – it’s easy!

Thanks to secure tunneling technology, NoTouch software is able to fluidly pass through  firewalls without opening up any security risks. This can be done on endpoints in the same network as you, or even on endpoints that are somewhere that you access, for example, in the Cloud.

Also, NoTouch uses state of the art encryption technology (SSL, TLS, HTTPS) to communicate from the client to NoTouch Center to ensure that shadowing is done in a totally secure fashion.

In addition to remote controlling the endpoint yourself, you can have multiple people initiate shadowing at the same time. This is fantastic for solving remote support use cases and for demonstration purposes.

Watch the entire demonstration on how to use shadowing with NoTouch in the video below.

You can also learn more about screen shadowing by visiting our knowledge base.

To use screen shadowing with NoTouch, simply:

  1. Log into NoTouch Center.
  2. Select the client you wish to shadow.
  3. Click the shadowing icon.
  4. The end user whose screen you are shadowing will be given the option to accept or deny your request to be shadowed.
  5. Assuming the end user accepts the request, you can now control the endpoint.

It works both ways – directly to an endpoint, or via NoTouch Center. With NoTouch Center you simply click on the client you wish to shadow – you don’t need to log into it specifically. All the logins make use of secure one-time passwords.

author avatar
epirker

HTML5 Screen Shadowing Demo – NoTouch Desktop

Screen Shadowing

Take advantage of advanced, secure and flexible shadowing using NoTouch software.

Stratodesk software uses HTML5 to enable screen shadowing right from your browser without any third-party software – it’s easy!

Thanks to secure tunneling technology, NoTouch software is able to fluidly pass through  firewalls without opening up any security risks. This can be done on endpoints in the same network as you, or even on endpoints that are somewhere that you access, for example, in the Cloud.

Also, NoTouch uses state of the art encryption technology (SSL, TLS, HTTPS) to communicate from the client to NoTouch Center to ensure that shadowing is done in a totally secure fashion.

In addition to remote controlling the endpoint yourself, you can have multiple people initiate shadowing at the same time. This is fantastic for solving remote support use cases and for demonstration purposes.

Watch the entire demonstration on how to use shadowing with NoTouch in the video below.

You can also learn more about screen shadowing by visiting our knowledge base.

To use screen shadowing with NoTouch, simply:

  1. Log into NoTouch Center.
  2. Select the client you wish to shadow.
  3. Click the shadowing icon.
  4. The end user whose screen you are shadowing will be given the option to accept or deny your request to be shadowed.
  5. Assuming the end user accepts the request, you can now control the endpoint.

It works both ways – directly to an endpoint, or via NoTouch Center. With NoTouch Center you simply click on the client you wish to shadow – you don’t need to log into it specifically. All the logins make use of secure one-time passwords.

author avatar
epirker

Subscribe to our newsletter:

Back To Top