Tech Support

Five Ways to Restrict User Access

For IT administrators in the retail, financial and government sectors, security is often a top priority. Given the sensitive nature of the data these organizations collect and store, they can't afford to incur a security breach. As such, they will go to great lengths to protect their interests.

When it comes to remotely managing technology assets, remote control solutions undoubtedly improve efficiencies, but they can vary significantly in their security capabilities. Where some solutions simply rely on password protection, others require user acceptance to establish a connection. But the most secure solutions - like Netop Remote Control - offer multiple layers for preventing unauthorized access to target devices:

  • Using MAC/IP address checks, target devices will only accept invitations from a service representative whose address appears in a predefined MAC/IP list.
  • With closed user groups, companies can obtain a custom serial number to the software used by service desk representatives and target devices. Then, only in situations when the serial number of the service desk representative’s machine matches that of the target device can a connection between the devices be established. Other attempts will automatically be rejected.
  • Netop Remote Control can integrate with the authentication scheme currently deployed across a company’s network. This includes Microsoft Active Directory as well as RSA SecureID, RADIUS and Microsoft Azure multi-factor authentication. Integrating with the existing authentication scheme provides a secure method for the service representative to identify itself to the target device.
  • With callback, the target device can call the service representative. This requires the service desk representative to be at a specific location, which is yet another obstacle to prevent intruders. Callback is especially relevant in industries where many systems are connected through modems, such as retail stores, banks and gas stations.
  • When user-controlled access has been configured, a pop-up window appears on the target device asking the end-user whether they want to accept an incoming request from the service representative. A remote control session cannot be established until accepted by an end-user.

These techniques for restricting access represent one aspect of Netop’s comprehensive security capabilities. For more information, visit netop.com/remotesupport.

Related

November 16, 2017 at 3:16 PM
In "Financial Services", "Financial Technology", "Government Technology", "Health Technology", "POS", "Remote Support", "Network Security", "Customer Service", "GDPR Compliance", "Industrial Technology", "Retail Technology"
August 9, 2017 at 4:23 AM
In "POS", "remote vendor access", "Remote Support", "Secure remote access", "Network Security"
July 7, 2017 at 10:38 AM
In "data breach", "Financial Services", "Financial Technology", "Government Technology", "Health Technology", "network security", "POS", "pos security", "Remote Support", "Retail Network Security 2017", "Network Security", "Cybersecurity", "data security", "Industrial Technology", "IT Security", "retail network security", "Retail Technology"

Subscribe to Email Updates

OUR LOCATIONS

Birkerød, DK
Portland, OR, US
Chicago, IL, US
Bucharest, RO

Americas: +1 866 725 7833
Worldwide: +45 4590 25 25

Our Tweets

RECENT POSTS