CielView-Server minimizes redundancy in computing resources while allowing users remote desktop access to virtualized user Desktops. CielView-Desktop provides customized solutions to each user in an organization. Login

It is literally a 'desktop-view' into an individual's workstation that is accessible anywhere in the world where intenet connection is available. Users will have access to their workstations exactly as they left it, and all their applications are available as though they are sitting in front of their desk-top at work. It is HIPAA, SSAE 16, and PCI compliant using Microsoft authentication regime of Kerberos, NTLM and TLS/SSL. Thin-clients for CielView range in sizes as small as a smartphone to a small tablet depending on the user's preference. If you need specially customized thin-clients other than what's widely available in open market, we can build one for you. All user data is on your CVD, including the ones deemed as "local" such as C/D/E drives. Local dirves are always accessible and backed up, therefore a disaster recovery is easily manageable.

CielView operates on various configurations. CielView can be integrated into any type of environment. If you have your IT infrastructure outsourced to a remote data center, CielView can be seamlessly integrated into that type of framework. If your IT infrastructure is in-house, we can integrate CielView into your organization with ease. Administrative access to CielView is remotely accessible from any location by trained CielView engineers. If a user needs help with their CielView-Desktop, such as installing a new software package or changing a configuration, a CielView technician can remotely and easily take control of any CielView-Desktop to solve user's problems. Technical staff is always a phone call or an email away from helping you with any issue.

CielView is designed to leverage idle CPU cycles and other computing resources. CielView is flexible for each person's needs for computational intensity. Our administrative program allows easy configuration to tailor each desktop according to their needs. You can configure your users based on types of tasks, or the departments they belong to, or in any number of different methods that would work for your organization. CielView is designed to work with various types of clients for variety of interfaces such as multiple monitors and HW or SW dongle based software. CielView uses the latest technologies in Hyper-Threading and virtualization, thereby minimizing redundancy to reduce your TCO.

CielView Desktop

CielView Desktop is a Virtualized PC

CielView-Desktop is your "view" into your Operating System that runs your business applications and interfaces with your data. You can have multiple desktops each accessing different subnets within your organization's IT infrastructure. Access to your CielView-Desktop only requires a thin-client and an Internet connection.

Once you have connection to our CielView, and logged into your CVD, it is as though you have full access to your regular machine at your desk in your office, without the headache and cost of maintaining and upgrading actual machines in your office. CielView-Desktop even works in your existing PC running an outdated operating system.

CielView-Desktop runs on any of your hand held devices such as your smartphone or tablets. When the time comes to replace your existing PCs due to hardware failures, you do not have to buy a completely new machine, instead replace them with any number of these much more economical thin-client options.

Business desktop anywhere

Access your business desktop anywhere. CielView desktop is about freedom; freedom to work from anywhere and any place. With CielView Desktop, your workstation, with all your apps and data, are available wherever you have an internet connection no matter what time it.

Thin Clients

We have a full line of thin clients to meet your cloud computing needs. Our thin clients have no moving parts that are prone to wear and tear. Our thin clients produce very little heat and consume less power than your cell phone.

IT infrastructure cost reduction

CielView reduces IT costs. CielView reduces hardware costs of replacing workstation. CielView also reduces server support costs. CielView makes use of idle CPU power in your IT infrastructure.

Efficient desktop support and management

CielView makes managing your PCs and servers simple. CielView Desktops and Servers are remotely controlled. CielView makes creating and setting up CielView Desktops and Servers simple. CielView makes it easy to roll out.

Total Cost of Ownership

Compare features and TCO with other remote desktop systems


CielView Frequently Asked Questions

Critical Windows Zero-Day Flaw Warning

The flaw exists because the Windows version of Adobe Type Manager Library improperly handles a specially-crafted multi-master font (called the Adobe Type 1 PostScript format). Type 1 vector outline fonts are a specialized form of PostScript, which contain instructions for building outlines from scaleable lines and curves ...

Apple Fixes Critical WebKit Flaws in iOS, Safari

The most severe of the vulnerabilities is a type confusion bug, CVE-2020-3897, in WebKit. Type confusion flaws are caused because a piece of code doesn't verify the type of object that is passed to it, and uses it blindly without type checking. The flaw could be abused by a remote hacker but user interaction is required to exploit the vulnerability. The vulnerability allows remote hackers to execute arbitrary code on affected installations of Apple Safari ...

APT36 uses Coronavirus to Spread Crimson RAT

Previous APT36 campaigns mainly relied on spear phishing and watering hole attacks to gain its foothold on victims. This most recent phishing email attaches a malicious macro document that targets vulnerabilities in RTF files. This is a high-severity Microsoft vulnerability, which allows hackers to execute Visual Basic script when a user opens a malicious Microsoft Office RTF document. ...

Corona virus Themed Attack Spreads Malware

After the victim opens the specially crafted RTF document, and the Microsoft Word vulnerability is exploited, a malicious file,intel.wll, is dropped into the Microsoft Word startup folder ( %APPDATA%MicrosoftWordSTARTUP ). This serves to persist the malware and prevents the infection from fully activating if run inside a sandbox since a relaunch of Microsoft Word is required for the full execution of the malware. The file, intel.wll, then downloads a DLL file, which serves as the loader for th ...