An excellent screen sharing service that's free? Surely there's a catch? Karl Wright takes a closer look in our review.
Screen sharing software can be a pain. The worst examples we've seen react slowly, have lots of unnecessary features, are difficult to get your head round and can even leave you unsure as to whether you're talking to everyone in the meeting or just a specific participant.
Join.me wasn't like that. For starters, it's free. We like free. Who doesn't? It's only a small program that's quick to install and isn't bloated out with lots of features you don't need. It lets you share your computer's screen with others over the internet, instant message other meeting participants, share files and even allow another participant to take over your computer.
To start a meeting, all you need to do is open the software. It will automatically generate a meeting code for you. Click on the code and you're offered the option to either copy it to your clipboard or email it to other meeting participants. When they receive the code, the people you want to share your screen with just copy and paste it into the join.me website and click join'. It's that simple.
As well as plain screen sharing, Join.me allows you to pause a meeting, giving you time to answer an email or get rid of a pop-up before sharing again. And if you want to share a file, all you need to do is select the user you want to share with, open the file-sharing dialogue and browse to the file. A window will pop up on their screen asking them to accept the transfer.
Meetings are protected with 256-bit SSL encryption. If someone makes themselves unwelcome or just forgets to log out of a meeting, you can remove them by clicking the x' next to their name.
How virtual desktop infrastructure enables digital transformation
Challenges and benefits of VDIFree download
The Okta digital trust index
Exploring the human edge of trustFree download
Optimising workload placement in your hybrid cloud
Deliver increased IT agility with the cloudFree Download
Modernise endpoint protection and leave your legacy challenges behind
The risk of keeping your legacy endpoint security toolsDownload now