Ratings and Reviews 0 Ratings
Ratings and Reviews 125 Ratings
What is Pega Co-Browse?
No downloads, installations, or plugins are required; just insert a line of Javascript into your website, and your customers can effortlessly share their browsing experience with a single click. Pega Co-Browse simplifies the process of highlighting and guiding customers to the necessary information, creating a fluid interaction. You have the ability to seek the customer’s permission to take control of their screen for assistance, or you can make use of highlighting tools and visual cues, like arrows, to guide them effectively. Additionally, Pega Co-Browse allows you to identify and obscure sensitive data through HTML elements or form fields, ensuring that all hidden information stays on the customer's browser and remains unseen by the representative. This solution provides a code-free method for hiding or obscuring text fields and images, giving businesses the power to manage what information agents can access. Furthermore, Pega Co-Browse can seamlessly integrate with Pega Chat or any other chat application, greatly enhancing the customer service process. You also have the flexibility to embed chat features directly into your Pega Customer Service application, boosting operational efficiency and improving the overall user experience. By utilizing these tools, businesses can foster more secure and productive interactions with their clients.
What is Kasm Workspaces?
Kasm Workspaces enables you to access your work environment seamlessly through your web browser, regardless of the device or location you are in.
This innovative platform is transforming the delivery of digital workspaces for organizations by utilizing open-source, web-native container streaming technology, which allows for a contemporary approach to Desktop as a Service, application streaming, and secure browser isolation.
Beyond just a service, Kasm functions as a versatile platform equipped with a powerful API that can be tailored to suit your specific requirements, accommodating any scale of operation. Workspaces can be implemented wherever necessary, whether on-premise—including in Air-Gapped Networks—within cloud environments (both public and private), or through a hybrid approach that combines elements of both. Additionally, Kasm's flexibility ensures that it can adapt to the evolving needs of modern businesses.
Integrations Supported
Accenture Cloud Trade Promotion Management
Audacity
CentOS
Chromium
Fedora CoreOS
GIMP
Insomnia
LibreOffice
Microsoft Edge
Microsoft Teams
Integrations Supported
Accenture Cloud Trade Promotion Management
Audacity
CentOS
Chromium
Fedora CoreOS
GIMP
Insomnia
LibreOffice
Microsoft Edge
Microsoft Teams
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$0 Free Community Edition
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Pega
Date Founded
1983
Company Location
United States
Company Website
www.pega.com/products/customer-service/cobrowse
Company Facts
Organization Name
Kasm Technologies
Date Founded
2017
Company Location
United States
Company Website
kasm.com
Categories and Features
Categories and Features
Application Virtualization
Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances
Cloud Workload Protection
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Container Management
Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization
Container Security
Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Desktop as a Service (DaaS)
Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
Digital Workplace
Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management
Remote Desktop
Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management
Virtual Desktop (VDI)
Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration
Virtualization
Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring
Web Content Filtering
Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting