• Location
    • Select Your Region
    • Region Name 1
    • Region Name 2
    • Region Name 3
    • Region Name 4
    • Region Name 5
Get a Free Trial
menu
ConnectWise Control Access
keyboard_arrow_down
security

Remote Access Security

Trust World Class Security Scalable to Your Needs

Your customers are relying on you to keep their environments secure, so we've equipped you with a layered approach to security, perfect for teams of all sizes. ConnectWise Control provides you with the tools and safeguards that matter most, so you can expect world-class features like role-based permissions, 256-bit AES encryption, and multiple authentication methods, along with premium reporting capabilities that allow you to record sessions, view activity from a single pane of glass, and much more.

Control Who Has Access

Remote access levels may vary by technician, as do your customers’ security and compliance needs. ConnectWise Control provides options to put you in charge.

Role Based Security
Unrestricted access invites threats. With role-based security, administrators can determine user permissions and control who has access to what features, functions, and groups of machines - down to the most granular details.

Learn More >>

Audit Logs
Reap the benefits of built-in accountability! With detailed session audit logs you can reference host name, guest information, and timestamps whenever you need to, and easily pull session activity such as: sent commands, tools ran, transferred files, and more.

Video Assurance
Need to know exactly what happened during a session? Take audit logs one step further with video logging. Record session to the server for compliance, auditing, and training with optional configuration.

Make Customers Comfortable

Ease customer qualms about allowing remote access to their computer or server by giving them control over duration and keeping the session transparent.

Permission Based
Empower the end users to be the gatekeepers of their machines by enabling permission-based security. Not only will they feel more comfortable about granting access to their machine, but the technician can be sure they’ve have permission to take control.

Consent Request
Send the end user a request for consent to control their machine. This action doesn’t interrupt the end user while they’re working, and lets them feel more comfortable handing over control when they’re ready to.

Open Communication
Communication is the key to successful technician/end user relationships, and Open Communication adds an extra layer of transparency by allowing the end user to observe the tech’s actions and talk with them throughout the session.

No Footprint
Cure any residual discomfort there might be after a support session has ended knowing that the client is completed removed.

Ensure In-House Security

Protect all data passing between host and guest systems – including data, file transfers, keystrokes and chats – encryption similar to that used by many banking and government institutions.

AES-256 Encryption
Protect data transmitted between the user's browser and the server through a proprietary protocol and our AES-256 encryption algorithm. And rest assured that all cloud instances of ConnectWise Control are automatically secured with SSL certificates.

Server Level Auditing
Store audit logs and optional recordings for every session for reference later. The server's SQLite database stores all logged data, which users can then query for custom reporting.

Self Hosted Application
If you need to meet compliance demands and cannot operate in the cloud, consider going self-hosted in your own environment.

User Authentication and Security

Authenticate your team with a diverse set of features and methods to validate users.
Windows and Forms Authentication

Users can securely authenticate using their existing Windows credentials.

Two-Factor Authentication

Adds another layer of defense against cyber criminals at the login step and helps keeps your end users' data protected.

Brute Force Attack

Lock out users after a predetermined number of failed login attempts, foiling potential hackers from access your environments.

Session Timeout

If a user idles on the Host and/or Admin page for a certain amount of seconds, they'll be logged out of your instance.

LDAP and Active Directory

There's no need to manage users in multiple systems. With Control, you can use external user source to securely authenticate into ConnectWise Control.

Restrict Login by IP

Allow administrators to restrict which machines allow technician login, giving additional control to the administrator with the ability to limit access.

ConnectWise Control

Try Remote Access that Just Works

Got It!

The website uses cookies. Cookies allow us to give you the best browsing experience possible and mean that we can understand how you use our site. By continuing to use this website, you are giving consent to cookies being used. For more information, please see our privacy policy. Privacy Policy

Partner Support