Deployment
  • 1 Minute to read
  • Dark
    Light
  • PDF

Deployment

  • Dark
    Light
  • PDF

Article summary

To access private resources and applications through Splashtop Secure Workspace, it is necessary for administrators to deploy connectors within the organization's private network or private cloud. Connectors act as lightweight processes that establish outgoing tunnels to Splashtop Secure Workspace edge locations. In this Deployment section, administrators can manage and monitor the deployment of connectors.

Deploying Connectors

The deployment of connectors is a crucial step in establishing a secure connection between the organization's private network and Splashtop Secure Workspace. Administrators need to install connectors within their private network infrastructure or private cloud environment. These connectors establish secure tunnels to Splashtop Secure Workspace edge locations, ensuring a safe and encrypted connection.

Managing Connector Deployment

The Deployment section of Splashtop Secure Workspace provides administrators with management capabilities for connectors. It offers visibility into the status and health of connector deployments. Administrators can monitor the performance of connectors and ensure their proper functioning to enable seamless access to private resources and applications.

Enhancing Visibility and Control

By managing connector deployments, administrators gain enhanced visibility and control over the overall deployment topology. They can track the status of connector deployments, monitor their performance, and explore the downstream applications, groups, and policies. This level of visibility allows administrators to maintain a secure and efficient connection for users accessing private resources and applications.

In conclusion, deploying connectors is an essential step in establishing a secure connection between your organization's private network or private cloud and Splashtop Secure Workspace. Through the Deployment section, administrators can manage and monitor connector deployments, ensuring optimal performance and security. Take advantage of the connector management capabilities to maintain a reliable and secure connection for accessing private resources and applications.

Connectors
Topology


Was this article helpful?

What's Next
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence