• Location
    • Select Your Region
    • Region Name 1
    • Region Name 2
    • Region Name 3
    • Region Name 4
    • Region Name 5
Get a Free Trial
menu
ConnectWise Control Support
keyboard_arrow_down
security

Remote Access Security

Trust World Class Security Scalable to Your Needs

Your customers are relying on you to keep their environments secure, so we've equipped you with a layered approach to security, perfect for teams of all sizes. ConnectWise Control provides you with the tools and safeguards that matter most, so you can expect world-class features like role-based permissions, 256-bit AES encryption, and multiple authentication methods, along with premium reporting capabilities that allow you to record sessions, view activity from a single pane of glass, and much more.

Control Who Has Access

Remote access levels may vary by technician, as do your customers’ security and compliance needs. ConnectWise Control provides options to put you in charge.

  • Role Based Security

Unrestricted access invites threats. With role-based security, administrators can determine user permissions and control who has access to what features, functions, and groups of machines - down to the most granular details.

Learn More >>
  • Audit Logs

Reap the benefits of built-in accountability! With detailed session audit logs you can reference host name, guest information, and timestamps whenever you need to, and easily pull session activity such as: sent commands, tools ran, transferred files, and more.

  • Video Assurance

Need to know exactly what happened during a session? Take audit logs one step further with video logging. Record sessions to the server for compliance, auditing, and training with optional configuration.

Make Customers Comfortable

Ease customer qualms about allowing remote access to their computer or server by giving them control over duration and keeping the session transparent.

  • Permission Based

Empower the end users to be the gatekeepers of their machines by enabling permission-based security. Not only will they feel more comfortable about granting access to their machine, but the technician can be sure they’ve have permission to take control.

  • Consent Request

Send the end user a request for consent to control their machine. If the end user is on their machine, they'll feel more comfortable knowing they can hand over control when they’re ready to.

  • Open Communication

Communication is the key to successful technician/end user relationships, and open communication adds an extra layer of transparency by allowing the end user to observe the tech’s actions and talk with them throughout the session.

  • No Footprint

Cure any residual discomfort there might be after a support session has ended knowing that the client is completely removed, and their machine can't be accessed again without their permission.

Ensure In-House Security

Protect all data passing between host and guest systems – including file transfers, keystrokes and chats – encryption similar to that used by many banking and government institutions.

  • AES-256 Encryption

Protect data transmitted between the browser and server through a proprietary protocol and our AES-256 encryption algorithm. And rest assured that all cloud instances of ConnectWise Control are automatically secured with SSL certificates.

  • Server Level Auditing

Store audit logs and optional recordings for every session for reference later. The server's SQLite database stores all logged data, which users can be queried for custom reporting.

  • Self Hosted Application

If you need to meet compliance demands and cannot operate in the cloud, consider going self-hosted in your own environment.

User Authentication and Security

Authenticate your team with a diverse set of features and methods to validate users.
Windows and Forms Authentication

Users can securely authenticate using their existing Windows credentials.

Two-Factor Authentication

Adds another layer of defense against cyber criminals at the login step and helps keeps your end users' data protected.

Brute Force Attack

Lock out users after a predetermined number of failed login attempts, foiling potential hackers from accessing your environments.

Session Timeout

If a user idles on the Host and/or Admin page for a certain amount of seconds, they'll be logged out of your instance.

LDAP and Active Directory

There's no need to manage users in multiple systems. With Control, you can use an external user source to securely authenticate into ConnectWise Control.

Restrict Login by IP

If a user idles on the Host and/or Admin page for a determined number of seconds, they'll be logged out of your instance.

ConnectWise Control

Try Remote Support that Just Works

With ConnectWise Control, you get easy-to-use remote access. That means reliable, secure remote support, access, and meetings.

Explore ConnectWise Control

Remote Support

Feel secure solving client issues from anywhere.

Find Out More >>

Remote Access

Allow administrators to define users with specific access permission.

Find Out More >>

Remote Meetings

Secure information by grouping sessions and restricting access to certain roles.

Find Out More >>

Got It!

The website uses cookies. Cookies allow us to give you the best browsing experience possible and mean that we can understand how you use our site. By continuing to use this website, you are giving consent to cookies being used. For more information, please see our privacy policy. Privacy Policy

Partner Support