- Select Your Region
- Region Name 1
- Region Name 2
- Region Name 3
- Region Name 4
- Region Name 5
Business Management Software
Quote & Proposal Automation Software
Cybersecurity Risk Assessment
Remote Monitoring & Management Software
Remote Control & Remote Access Software
Many Integrations, One Place to Buy
I'm looking to...
Your customers are relying on you to keep their environments secure, so we've equipped you with a layered approach to security, perfect for teams of all sizes. ConnectWise Control provides you with the tools and safeguards that matter most, so you can expect world-class features like role-based permissions, 256-bit AES encryption, and multiple authentication methods, along with premium reporting capabilities that allow you to record sessions, view activity from a single pane of glass, and much more.
Remote access levels may vary by technician, as do your customers’ security and compliance needs. ConnectWise Control provides options to put you in charge.
Role Based Security
Unrestricted access invites threats. With role-based security, administrators can determine user permissions and control who has access to what features, functions, and groups of machines - down to the most granular details.
Reap the benefits of built-in accountability! With detailed session audit logs you can reference host name, guest information, and timestamps whenever you need to, and easily pull session activity such as: sent commands, tools ran, transferred files, and more.
Need to know exactly what happened during a session? Take audit logs one step further with video logging. Record session to the server for compliance, auditing, and training with optional configuration.
Ease customer qualms about allowing remote access to their computer or server by giving them control over duration and keeping the session transparent.
Empower the end users to be the gatekeepers of their machines by enabling permission-based security. Not only will they feel more comfortable about granting access to their machine, but the technician can be sure they’ve have permission to take control.
Send the end user a request for consent to control their machine. This action doesn’t interrupt the end user while they’re working, and lets them feel more comfortable handing over control when they’re ready to.
Communication is the key to successful technician/end user relationships, and Open Communication adds an extra layer of transparency by allowing the end user to observe the tech’s actions and talk with them throughout the session.
Cure any residual discomfort there might be after a support session has ended knowing that the client is completed removed.
Protect all data passing between host and guest systems – including data, file transfers, keystrokes and chats – encryption similar to that used by many banking and government institutions.
Protect data transmitted between the user's browser and the server through a proprietary protocol and our AES-256 encryption algorithm. And rest assured that all cloud instances of ConnectWise Control are automatically secured with SSL certificates.
Server Level Auditing
Store audit logs and optional recordings for every session for reference later. The server's SQLite database stores all logged data, which users can then query for custom reporting.
Self Hosted Application
If you need to meet compliance demands and cannot operate in the cloud, consider going self-hosted in your own environment.
Users can securely authenticate using their existing Windows credentials.
Adds another layer of defense against cyber criminals at the login step and helps keeps your end users' data protected.
Lock out users after a predetermined number of failed login attempts, foiling potential hackers from access your environments.
If a user idles on the Host and/or Admin page for a certain amount of seconds, they'll be logged out of your instance.
There's no need to manage users in multiple systems. With Control, you can use external user source to securely authenticate into ConnectWise Control.
Allow administrators to restrict which machines allow technician login, giving additional control to the administrator with the ability to limit access.