- Select Your Region
- Region Name 1
- Region Name 2
- Region Name 3
- Region Name 4
- Region Name 5
Business Management Software
Quote & Proposal Automation Software
Cloud Monitoring, Management & Billing
Remote Monitoring & Management Software
Remote Control & Remote Access Software
ConnectWise Innovations & Product Releases
When you’re talking about remote access and control, security is critical to success. ConnectWise® Control™ provides a scaled security approach for companies of all sizes, offering features that matter most. Whether you choose a self-hosted or cloud-based implementation model, you can rely on role-based security, 256-bit AES encryption, and multiple authentication methods, along with features including logging, video auditing and more.
Remote access levels may vary by technician, as do your customers’ security and compliance needs. Control provides options to put you in charge.
Limit technician access to functionality and sessions with granular security permissions.
Log each session host name, guest information, timestamps, and more.
Record sessions to the server for compliance, auditing, and training with the optional configuration.
Ease customer qualms about allowing remote access to their computer or server by giving them control over duration and keeping the session transparent.
Give customers full control over connection to their machine.
Ask unattended-session clients for permission to connect.
Let customers watch the tech work, initiate chats and end the session at any time.
Remove the remote support client from the customer machine at session end.
Protect all data passing between host and guest systems – including data, file transfers, keystrokes and chats – encryption similar to that used by many banking and government institutions.
ConnectWise Control resides in your environment, giving you full security control.
Get complete data protection through a proprietary protocol and our AES-256 encryption algorithm.
Store audit logs and optional recordings for every session.
Connect supports both for login access.
Choose from several methods for an added layer of security.
Lock out users after a predetermined number of failed login attempts.
Configure settings to void existing clients after a certain time frame.
Utilize existing roles and active directory roles to authenticate users.
Allow administrators to restrict which machines allow technician login.