Security You Can Count On
Your job is to help your customers, and our job is to help you accomplish that in the most efficient and secure manner possible. ScreenConnect was designed from the ground up to provide a scaled security approach to fit the organizational needs of companies of all sizes.
With ScreenConnect, there is no sacrifice in security for your team or customers. Here are some of the key points of ScreenConnect security:
- Self-hosted or cloud-based implementation model
- Role-based security
- 256-bit AES encryption
- Multiple authentication methods
- Logging, video auditing, and more
Start with your technicians
Not all technicians are created equal, and neither are organizations' security and compliance needs. ScreenConnect provides a host of features that will help control access to your remote support solution while keeping the process simple.
Some popular technician security features include:
- Option to limit access to certain sessions
- Administrator control over client feature set
- Screen recording
- Audit logs to document technician activity
Granular security permissions can limit technician access to functionality and sessions.
Each session is logged with session host name, guest information, timestamps, and more.
Optional configuration to record every session to the server for compliance, auditing, and training purposes.
Make Customers Comfortable
Allowing remote access to a computer or server can often be a stressful activity for customers. Keeping the remote session completely transparent and granting your customers control over the session duration can go a long way to helping them relax.
Our remote support sessions provide customers full control over when someone is allowed to connect to their machine.
Customers can watch the tech working, initiate chat sessions, or end the session at any time.
Optional setting to ask unattended-session clients if it's okay to join their machines.
The remote support client is removed from the customer machine after the session is ended.
All data passing between host and guest systems is fully encrypted and protected from unauthorized access. This includes all screen data, file transfers, keystrokes, and chat messages. ScreenConnect employs a 256-bit AES encryption algorithm, similar to that used by many banking and government institutions.
No 3rd-party servers; ScreenConnect resides in your environment, giving you full security control.
Complete data protection through a proprietary protocol and our AES-256 encryption algorithm.
Server Level Auditing
ScreenConnect provides audit logs and optional recordings for every session, stored with Your Installation.
User Authentication and Security
Authenticating your team to make sure only approved people are accessing Your ScreenConnect installation is an important part of the security process. ScreenConnect provides a diverse set of features and methods for validating users.
A few of the more important aspects of user authentication include:
Windows and Forms Authentication
ScreenConnect supports both Forms and Windows Authentication for login access.
Several two-factor authentication methods are available for an added security layer.
LDAP and Active Directory
Utilize your existing roles and Active Directory roles to authenticate your users.
Brute Force Attack
Configuration options allow administrators to lock users out after "n" failed attempts.
Configuration settings are available that make existing clients void after a predetermined time frame.
Restrict Login by IP
Allow administrators to restrict what machines a technician can log in from.
Learn more about ScreenConnect security
We have a variety of knowledge articles that you might find useful and informative, ranging in topics from our system architecture to branding and customization.