NetSupport Manager has been recognised for the last 31 years as delivering the most secure remote control available. The latest version continues to expand our security from activity logs and user acknowledgement to 256-bit encryption, smartcard support, AD integration and much more. NetSupport Manager is the choice of military and financial institutions across the globe.
You can record and replay remote sessions for audit purposes – and even profile individual Control users and Client workstations to provide different security levels and capabilities.
NetSupport Manager supports smartcards – any smartcard login performed on the Control PC is re-directed and applied on the Client PC.
Key security features:
Password protection of all systems.
User acknowledgement (User must be present and authorise each inbound connection request).
Data encryption – configurable options from 56-bit DES to 256-bit AES.
Security keys (makes the licensed copy of NetSupport Manager unique to the organisation and non-compatible with other copies of the software).
Record and replay remote control sessions to keep a history of all activity during a session.
Limit connectivity by user account or originating IP address and control HTTP access based on the IP address (only allow connections from known locations).
Blank client screen when performing confidential actions.
Auto logout of a remote system on disconnect (avoids a system being mistakenly left in a logged in state).
User-defined Inactivity Timeout on open connections.
Dialback security for dial-up connections.
Centrally deploy and manage security configurations from a single location.
Smartcard Support – any login performed on the Control PC is re-directed and applied on the Client PC.
Smartcard Authentication – User validation for connections now supports authentication using a Smartcard PIN as well as the existing remote login support.
Integrate with existing NT user profiles to validate an inbound user before a connection request is accepted.
Integrate directly with Active Directory profiles for user validation.
Supplied with Active Directory templates to enable system-wide compliance with pre-defined client configurations.
Profiled functionality – allow different functionality to be available depending on the authenticated user making a connection.
Full event and history logs including integration with OS event logs.
* The ‘Control’ is the PC that views/takes over a PC.
* The ‘Client’ is the PC that is being viewed or taken over.