Govern Remote Support Security from a Central Location
Enterprise-level security goes well beyond encryption. It takes a comprehensive, multi-layer strategy: who has access? what are they allowed to do? where’s the documentation? Netop Security Server lets you answer these questions in granular detail, from a central location.
When installed on your server, it answers queries from Netop Remote Control about session permissions and access rights across a network connection, giving you centralised control of security, administration, authentication and authorisation on every user in your system.
You decide which machines a technician (or group) can support. You define permissions for hundreds to thousands of users. Your settings are stored in an ODBC-compliant database, where you can make changes centrally, without having to update local settings on every target machine. Security Server also keeps a centralised audit trail on all remote support activity, so any unauthorised action can be traced and dealt with.
The advantages of using Netop Security Server
- Extended protection - configure your Netop Remote Control Hosts to validate incoming remote support sessions via your own Security Servers using 2048-bit RSA Public/Private key exchanges
- Govern access rights - when you have different types of users requiring remote access into different end points, it can be difficult to manage. Netop Security Server provides a central location where granular permissions can be defined dictating who is granted access including support staff, system administrators and third-party vendors
- Integrate, authenticate - verify identities via Netop, Windows, Directory Services, Smart Cards or RSA SecurID, integrating with your existing security policies
- Build fault-tolerance - establish multiple security servers, ensuring uptime with a fault-tolerant environment. If one fails, others take over without missing a beat
For over 30 years, Netop has provided complex remote maintenance from one intuitive interface, so you can streamline costs, resolve technical difficulties anywhere, any time, and comply with rigorous security regulations while doing so.