Search Mobile Nav
ConnectWise Control
security

Remote Support Security

Trust World Class Security Scalable to Your Needs

When you’re talking about remote access and control, security is critical to success. ConnectWise® Control™ provides a scaled security approach for companies of all sizes, offering features that matter most. Whether you choose a self-hosted or cloud-based implementation model, you can rely on role-based security, 256-bit AES encryption, and multiple authentication methods, along with features including logging, video auditing and more.

Give Techs the Control They Need

Remote access levels may vary by technician, as do your customers’ security and compliance needs. Control provides options to put you in charge.

  • Role Based Security

Limit technician access to functionality and sessions with granular security permissions.

  • Audit Logs

Log each session host name, guest information, timestamps, and more.

  • Video Assurance

Record sessions to the server for compliance, auditing, and training with the optional configuration.

Make Customers Comfortable

Ease customer qualms about allowing remote access to their computer or server by giving them control over duration and keeping the session transparent.

  • Permission Based

Give customers full control over connection to their machine.

  • Consent Request

Ask unattended-session clients for permission to connect.

  • Open Communication

Let customers watch the tech work, initiate chats and end the session at any time.

  • No Footprint

Remove the remote support client from the customer machine at session end.

Ensure In-House Security

Protect all data passing between host and guest systems – including data, file transfers, keystrokes and chats – encryption similar to that used by many banking and government institutions.

  • Self Hosted Application

ConnectWise Control resides in your environment, giving you full security control.

  • AES-256 Encryption

Get complete data protection through a proprietary protocol and our AES-256 encryption algorithm.

  • Server Level Auditing

Store audit logs and optional recordings for every session.

User Authentication and Security

Authenticate your team with a diverse set of features and methods to validate users.
Windows and Forms Authentication

Connect supports both for login access.

Two-Factor Authentication

Choose from several methods for an added layer of security.

Brute Force Attack

Lock out users after a predetermined number of failed login attempts.

Session Timeout

Configure settings to void existing clients after a certain time frame.

LDAP and Active Directory

Utilize existing roles and active directory roles to authenticate users.

Restrict Login by IP

Allow administrators to restrict which machines allow technician login.

ConnectWise Control

Try Remote Support that Just Works

With ConnectWise Control, you get easy-to-use remote access. That means reliable, secure remote support, access, and meetings.

Explore ConnectWise Control

Remote Support

Feel secure solving client issues from anywhere.

Find Out More >>

Remote Access

Allow administrators to define users with specific access permission.

Find Out More >>

Remote Meetings

Secure information by grouping sessions and restricting access to certain roles.

Find Out More >>

Got It!

The website uses cookies. Cookies allow us to give you the best browsing experience possible and mean that we can understand how you use our site. By continuing to use this website, you are giving consent to cookies being used. For more information, please see our privacy policy. Privacy Policy

Partner Support >>