Introducing G2.ai, the future of software buying.Try now
SecureW2 JoinNow
Sponsored
SecureW2 JoinNow
Visit Website
Product Avatar Image
Remote.It

By Remote.It, Inc

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Remote.It, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.5 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Remote.It?

SecureW2 JoinNow
Sponsored
SecureW2 JoinNow
Visit Website
It's been two months since this profile received a new review
Leave a Review

Remote.It Reviews & Product Details

Remote.It Media

Remote.It Demo - remote.it portal
Product Avatar Image

Have you used Remote.It before?

Answer a few questions to help the Remote.It community

Remote.It Reviews (3)

Reviews

Remote.It Reviews (3)

4.5
3 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
ARJUN V.
AV
Software Engineer
Small-Business (50 or fewer emp.)
"The perfect software to enhance remote connections"
What do you like best about Remote.It?

*It is really fast and enables remote connections very fastly.

*User can add multiple devices at a time.

*It is very useful when working with a team such as one user can add the device in remote.it and he can give access to the team members.

*Its very simple to configure in embedded devices and embedded devices can be accessed remotely.

*Good UI Review collected by and hosted on G2.com.

What do you dislike about Remote.It?

* Needs to enhance the readability of remote addresses. (improvement is there when compared to the previous version)

* Understanding of software configurations are bit confusing. User experience needs to be enhanced. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
UI
Small-Business (50 or fewer emp.)
"Secure and reliable remote access solution!"
What do you like best about Remote.It?

remote.it offers a convenient and secure way to access and manage the devices remotely. It works even when traditional VPNs don't. Review collected by and hosted on G2.com.

What do you dislike about Remote.It?

Some of the other users told me that they find remote.it services as complex to set up or manage. So it can be more user friendly. Review collected by and hosted on G2.com.

Verified User in Management Consulting
CM
Enterprise (> 1000 emp.)
"Good device management middleware platform for IoT devices"
What do you like best about Remote.It?

Remot3.it provides good API integration where you can write programs in your language to integrate., which is very convenient. Review collected by and hosted on G2.com.

What do you dislike about Remote.It?

Lesser options of selecting plans for IoT devices. Limited data plans for devices, which make the transmission of data limited Review collected by and hosted on G2.com.

There are not enough reviews of Remote.It for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(1,036)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(566)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
3
BetterCloud Logo
BetterCloud
4.4
(477)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
4
Cisco Duo Logo
Cisco Duo
4.5
(429)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
5
ThreatLocker Platform Logo
ThreatLocker Platform
4.8
(294)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
6
Absolute Secure Access Logo
Absolute Secure Access
4.7
(225)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
7
FortiClient Logo
FortiClient
4.4
(211)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
8
Trend Vision One Logo
Trend Vision One
4.7
(211)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
9
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.5
(195)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
10
GoodAccess Logo
GoodAccess
4.7
(160)
GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Remote.It
View Alternatives