UltraView Remote 2 represents the latest state-of-the-art technology in KVM access and CPU switching over IP. UltraView Remote 2 is today's solution for remote server management. The simple-to-use on-screen menu provides fast and easy access to any computer, locally, over your network, or from anywhere in world. This makes for easy management of computer system. The UltraView Remote 2 can connect directly to 8, or 16 computers or servers. As your business expands, so can UltraView Remote 2. Regardless of KVM needs, you will find that UltraView Remote 2 can meet system growth requirements, security requirements and ease of use. When time comes to add more computers, rest assured that UltraView Remote 2 can be easily expanded by chaining units together. When using 16-port units, you can expand UltraView Remote 2 to 256 computers. Expansion units should be ServView Pro or UltraView Pro KVM switch. UltraView Remote 2 can not be used as an expansion unit. UltraView Remote 2 supports PC, Apple ADB, Sun, USB, and UNIX computers. With its ability to access computers and servers locally or over IP, its advanced on-screen menu system, built-in security, flash memory, easy expansion and other features, you start to get sense of advantages and applications that UltraView Remote 2 can provide.
- Video resolution up to 1600 x 1200
- Uses UltraCable for superior cable management with lengths up to 100ft
- On-screen menu for configuration and computer selection
- Up to 4 remote users can connect to same remote user port simultaneously
- Users connected to same remote user port share all functions
- Built-in daisy-chaining to support up to 256 computers
- Pre-configuration feature allows installation without powering down servers or computers
- Multi-platform models convert PC, UNIX, Apple, or Sun keyboard and mouse data to any platform, multi-platform models also support audio or serial pass through (touchscreen)
- Switch computers using simple keyboard commands, using on-screen menu, or serial input to RS232 port
- Security system with configuration and user passwords prevents unauthorized configuration
and user access