Security

Data transfer encryption

One of the most important security features of the Remote Utilities remote desktop software is its ability to encrypt all communications between the Viewer and the Host. With TLS 1.2, the program secures any data transferred—including screen captures and files— across the remote terminals, ensuring only authorized persons can get access to the data.

Regardless of the license type you purchased and the connection type you operate, the data encryption security feature is always available for your data safety. Data transfer encryption is always ON and cannot be disabled by any user.


Address book encryption

Aside from holding the details of the remote computers across the network, one of the everyday things the address book may contain is the access password. The implication here is that when the security of the Viewer workstation has been compromised, an unauthorized user can gain access to the address book and your access password.

Remote Utilities helps eliminate the risk of losing your data when your device is stolen. With address book encryption, any breach of the Viewer workstation does not affect the security of the content of the address book.


Two-factor authentication

Use Remote Utilities two-factor authentication to prevent an unauthorized person from gaining entry into your remote network even if they guessed or otherwise obtained your access password. To generate one-time passwords (OTPs) you can use Google Authenticator or any other compatible 2FA app.


Host identity check

Remote Utilities further protects remote Hosts against unauthorized access with the Host identity check security. This identity check mechanism is certificate-based and ensures that you establish a connection with the Host you have in mind. When you are not connected to the intended Host, Viewer flags you red and issues a warning to guide you in what to do.


Autonomous mode

Remote Utilities can work in an isolated environment without communication with our web servers. You can:

  • Create connections with a remote computer via LAN or VPN.
  • Establish a network using one Host to foster a connection with other Hosts via LAN.
  • Sync your address book among multiple Viewers by using a self-hosted server.
  • Route your Internet-ID connection via a self-hosted server and bypass firewalls and routers.

No blank passwords

Regardless of the authentication method you choose, blank passwords are not allowed. There are no default or technical passwords either. Only you and the people you authenticate will know how to access the Host that you have installed.


Brute-force attack protection

With this security feature, Remote Utilities ensures that unauthorized access to your remote connection fails even when you do not have the two-factor authentication set. The program secures you against brute-force attack by increasing the time before fresh login attempts can be made after the wrong passwords entered have exceeded a limit.

Also, the same algorithm bans the originating IP address temporarily when it determines that the remote Host is under attack.


No stealth mode

A persistent Host icon in the system tray informs the remote user that Remote Utilities is running on their computer. As a remote user with administrative privileges, you can always uninstall Remote Utilities software if you did not authorize its installation.


Ask user permission

When you turn on Ask user permission, you trigger a message to accept or refuse remote sessions. This security feature ensures that only authorized persons can access the remote computers. Also, in the case of unattended access, the Ask user permission security feature allows you to set a particular timeout and a default activation action.


IP filtering

You can set the remote Host or RU Server to accept connections only from selected IP addresses and blacklist a range of IP addresses you feel could pose a security challenge. This connection restriction helps safeguard data across industries—such as finance and healthcare— with strict requirements when processing personal data.


Host settings protection

With Remote Utilities you can lock your settings for the Host with a password. This protection is essential when you do not want any remote user to tamper with the settings you have made for the Host. Additionally, Remote Utilities allows you to hide the right-click menu to ensure that remote users do not modify any of your settings.

 

This website uses cookies to improve user experience. By using this website you agree to our Terms of Service and Privacy Policy.