Self-Hosted
Your infrastructure, your data, your rules
Remmy runs on your own server - on-premises or in the cloud. A lightweight agent on each computer connects back to your server over the internet, so you can manage any computer, anywhere, without handing your data to a third party.
Screenshot
On-prem
or cloud
HOST ANYWHERE
Lightweight
agent
ANY DEVICE
Full data
ownership
YOUR DATA
No
third parties
PRIVATE
Works
anywhere
CLOUD ENABLED
Screenshot
Host it wherever you want
Install Remmy on a local server in your office, a VM in your data center, or a cloud instance on AWS, Azure, or any provider you prefer. You choose the environment that fits your security requirements and budget - Remmy works the same everywhere.
- Deploy on-premises on your own hardware or virtual machines
- Run in the cloud on AWS, Azure, Google Cloud, or any VPS provider
- Simple installation with minimal system requirements
- Full control over updates, backups, and server configuration
Screenshot
Reach any computer, anywhere
Remmy uses a lightweight agent installed on each managed computer. The agent connects outbound to your Remmy server over the internet, so there's no need for VPNs, port forwarding, or complex network configurations. If a computer has an internet connection, you can manage it - whether it's in the office, at an employee's home, or on the other side of the world.
- Lightweight agent with minimal resource footprint
- Outbound connection - no inbound ports or VPN required
- Manage computers across offices, remote workers, and data centers
- Automatic reconnection when connectivity is restored
Screenshot
Your data never leaves your control
With Remmy, there's no shared cloud, no multi-tenant database, and no third party sitting between you and your data. Computer inventory, patch status, scripts, policies - everything lives on your server. You decide who has access, how long data is retained, and where it's stored.
- All data stored on your own server - nothing leaves your network
- No third-party access to your computer data or configurations
- Full control over data retention, backups, and encryption
- Meet compliance requirements without depending on a vendor's policies