- Select Your Region
- Region Name 1
- Region Name 2
- Region Name 3
- Region Name 4
- Region Name 5
Business Management Software
Quote & Proposal Automation Software
Cloud Billing, Monitoring & Management
Remote Monitoring & Management Software
Remote Control & Remote Access Software
Many Integrations, One Place to Buy
I'm looking to...
ConnectWise Control® offers a layered approach to security, perfect for support teams of all sizes. Focusing on the safeguards that matters most, you can expect world-class features like role-based permissions, 256-bit AES encryption, and multiple authentication methods, along with premium reporting capabilities that allow you to record sessions, view activity from a single pane of glass, and much more..
Remote access levels may vary by technician, as do your customers’ security and compliance needs. Control provides options to put you in charge.
Limit technician access to functionality and sessions with granular security permissions.
Log each session host name, guest information, timestamps, and more.
Record sessions to the server for compliance, auditing, and training with the optional configuration.
Ease customer qualms about allowing remote access to their computer or server by giving them control over duration and keeping the session transparent.
Give customers full control over connection to their machine.
Ask unattended-session clients for permission to connect.
Let customers watch the tech work, initiate chats and end the session at any time.
Remove the remote support client from the customer machine at session end.
Protect all data passing between host and guest systems – including data, file transfers, keystrokes and chats – encryption similar to that used by many banking and government institutions.
ConnectWise Control resides in your environment, giving you full security control.
Get complete data protection through a proprietary protocol and our AES-256 encryption algorithm.
Store audit logs and optional recordings for every session.
Connect supports both for login access.
Choose from several methods for an added layer of security.
Lock out users after a predetermined number of failed login attempts.
Configure settings to void existing clients after a certain time frame.
Utilize existing roles and active directory roles to authenticate users.
Allow administrators to restrict which machines allow technician login.