Security

Transferred data is encrypted with the secure encryption algorithms (RSA 2048 + AES 256).
User Access Control (UAC) prompts can be controlled remotely and are no longer an obstacle.
User access and control. Create users and set permissions for complete control over who accesses what. More...
Windows security support. Use existing Windows groups and accounts with set permissions to log in through Remote Utilities. More...
IP filtering. Restrict access to only certain IP addresses — use white lists and black list to add IP addresses and ranges to block or allow. More...
Disable all Internet-related features to use the program in a totally isolated environment. More...
Settings protection. Protect remote settings with a password against possible change by a user. More...
Ask user permission option lets the remote user accept or reject incoming remote connection. More...
Notification panel allows the remote user to see who is being connected to their PC at the moment and terminate the remote session if necessary. More...
Host authority. The shared secret option provides the means of verifying identity of the remote Host. More...

 Download Security Overview (.pdf, 941KB)

Buy SSL Certificates

Twitter Facebook Google Plus Linkedin Youtube