Security


Remote Utilities offers a multi-layered security system protecting your data from being compromised and your remote devices from unauthorized access. The default security settings provide strong defenses, but you can make them even stronger by enabling optional security features.

All-In-One Remote Access


Shielding Your Data from All Angles

Remote Utilities applies end-to-end TLS encryption to any transferred data, regardless of the license type and connection mode used. Encryption is always on and cannot be disabled.

Neither our public servers nor a self-hosted server can read the contents of the packets exchanged by the local and remote sides. The servers simply bounce the encrypted packets without seeing what's inside.

You can enable address book encryption to protect your remote inventory data stored on the local disk. This will safeguard your data in case your device is lost or stolen.


Keeping Unauthorized Access at Bay

Strong protection against unauthorized access is at the core of Remote Utilities, built on simple principles:

Secure at Every Level

Authentication is mandatory and cannot be disabled. You always authenticate, even if you use a saved password or local Windows credentials.

Fast Deployment

No blank, default, or technical passwords. Only you can create passwords or set user permissions. A remote Host without access credentials cannot be accessed.

High Configurability

Brute-force attack protection increases the time before new login attempts can be made after entering incorrect passwords.

Cost-Effective Licensing

Certificate-based Host identity checks protect against man-in-the-middle attacks, preventing the client from connecting to a malicious host.

All-In-One Remote Access

Two-factor authentication (2FA) adds an extra layer of security by requiring a second form of verification, keeping your remote access safe even if your password is compromised.


Ensuring Your Privacy Remains Intact

With the ask user permission option enabled, a message is displayed on the remote computer, prompting the user to accept or reject incoming connections. This protects the privacy of the user at the remote computer.

When you are connected remotely to a computer in a crowded place, someone may peek at the screen or even take a note or picture of important data. Use the blank remote screen feature to prevent unauthorized viewing of the remote screen during the session.

A notification panel can be enabled on the remote Host. This panel informs the remote user about who is connected to their computer and provides the means to terminate the remote session.

Discover the Power of Remote Utilities Today

Download 30-day Trial