TeamViewer: Remote assistance made simple.
Overall Satisfaction with TeamViewer
We considered TeamViewer and other options such as LogMeIn and AnyDesk in our selection criteria for a Working from Home solution. Although these tools provide comparable fundamental capabilities, TeamViewer outperformed the others in terms of cross-platform operation and a more manageable user interface.
Pros
- Named captions, which can easily be recognized from other cross-platform technologies, allow smooth remote access through different operating systems.
- The interface for initiating a remote session directly supports transferring files between the local and remote hosts.
- Rich remote viewing and controlling ability to support multiple monitors.
Cons
- Now, it doesn’t work in fast network environments: sometimes, data is delayed during transfer.
- There are a small number of ways that a user is allowed to change the interface on the device.
- Some minor increases in difficulty with advanced functions of the application.
- We have had a very positive experience using TeamViewer. Due to its reliability and user-accessible interface, it has become an intrinsic part of all our remote debugging sessions.
- The ability to quickly assert a connection and take over a colleague’s machine has cut substantially the time necessary to provide a resolution regarding intricate problems.
- These features have also been helpful for code reviews and for those instances when two developers are working on the same piece of code, pair programming or, in general, collaborative development.
Do you think TeamViewer delivers good value for the price?
Yes
Are you happy with TeamViewer's feature set?
Yes
Did TeamViewer live up to sales and marketing promises?
Yes
Did implementation of TeamViewer go as expected?
Yes
Would you buy TeamViewer again?
Yes
Thus, TeamViewer has been used to the fullest extent in our organization to enhance data security and conform to set security standards. Also, all users of our website now use authentication, which sharply decreases the possibility of unauthorized access. The implementation has been incorporated as a subsystem to our current identity management framework with enhanced ease of access.


Comments
Please log in to join the conversation