Welcome to Remote Shearman
 Log in
  Please select your destination:

  Please select your home office region:
  Please select your desired launch method:
 Help me choose

 Message Center
1. If you use a SecurID Token, enter your PIN and the number appearing now on the Token. No space. If you use Blackberry SecurID, enter the Passcode only.

2. Mac users selecting the Windows 7 option can only use the Citrix Receiver client to access Remote Shearman. Currently, Citrix only supports Mac OS X 10.6 and higher, and does not support Java Access for Mac OS. To download the appropriate client please use the links below
MacOS Citrix Receiver Download.
Windows Citrix Receiver Download.

3. If you are accessing Remote Shearman from a Business Center Kiosk, please select Java. Note, the Business Center Kiosk requires Java installed to run Remote Shearman.

4. For users selecting the Windows 7 option, please be aware, that you may only save documents into DM or your F:\ home drive. Documents and files saved on the VDI desktop or C: drive will be deleted upon logoff from the system.

 Connection Quality
Your connection speed can impact your Remote Shearman experience. Please note that connection speed may change during a session, and the below indicator should only be used as a guideline.
Network Connection
If you encounter any problems with this site, please check your internet connection. If problems persist, contact your local GTS support representative or call +1.212.848.5000.

WARNING: Use of this system is limited to authorized users of Shearman & Sterling LLP. This system contains confidential and proprietary information. Any unauthorized trespass into or use of this system is prohibited. Any such unauthorized trespass or use may be referred to law enforcement agencies for criminal prosecution and may subject you to civil penalties. Activities on this system are monitored and recorded, and subject to audit. By using this system, you represent that you are an authorized user of Shearman & Sterling LLP and consent to such monitoring and recording. Launching or downloading an attachment onto a computer that you do not control creates a significant security risk. Please remember to delete from the hard drive of this computer any attachments you launch or download.