SECURITY

Enterprise-Grade Security for Every Connection

At TSplus, security is not optional, it's essential. TSplus Remote Support integrates robust encryption, multifactor authentication, granular access controls, and compliance-focused features to guarantee secure, reliable, and private remote connections for your organization.

End-to-End Encryption

Protect Every Connection with Modern TLS Encryption

At the core of TSplus Remote Support’s security architecture is End-to-End TLS Encryption. Every remote session is encrypted from start to finish using modern TLS protocols, preventing unauthorized access or interception of data transmitted between the support agent and the end-user.

How It Works:

  • All remote session data, including screen sharing, commands, and file transfers, are encrypted using TLS
    (Transport Layer Security).
  • The encryption process ensures that no third party can intercept or manipulate the data during transit.
  • Even if the communication channels are exposed, the encryption keys remain private and secure.
Benefits of End-to-End TLS Encryption:

Protects sensitive information during remote sessions.

Prevents unauthorized data interception.

Ensures compliance with modern encryption standards.

Two-Factor Authentication (2FA)

Add an Extra Layer of Security to User Authentication

Two-Factor Authentication (2FA) ensures that even if a user's credentials are compromised, unauthorized access remains impossible. With 2FA enabled, logging in requires both a password and a unique verification code generated by a trusted authenticator app.

Supported Authenticator Apps:

Google Authenticator

Microsoft Authenticator

Authy

Key Features:

Time-based One-Time Passwords (TOTP).

Works offline once configured.

Configurable session expiration settings for added security.


How It Works:

  1. A user enters their standard login credentials.
  2. The system requests a one-time verification code from the authenticator app.
  3. Access is granted only after both credentials and the verification code are validated.

Autorisations d'accès granulaires

Fine-Tuned Control Over User and Team Access

With Granular Access Permissions, administrators can precisely manage who can access specific folders,
devices, and resources. This ensures sensitive systems are only accessible to authorized users or teams.

How It Enhances Security:
  • Ensures only authorized personnel have access to specific resources.
  • Simplifies user and resource management with inherited permissions.
  • Reduces the risk of accidental configuration changes.
Key Capabilities:
  • Define folder-specific access rules for teams and individuals.
  • Customize access levels (read-only, full control, or restricted access).
  • Permissions automatically inherit settings from parent folders for consistency.
  • Restrict access to prevent accidental or malicious interactions with critical systems.

Restricted Computer Access

Prevent Unauthorized Access to Remote Devices

With Restricted Computer Access, administrators can ensure that only users from the same subscription can
initiate remote connections. Any unauthorized attempt triggers an error message and blocks the connection
attempt.

Key Capabilities:
  • Block unauthorized access attempts from external users.
  • Automatically flag and reject suspicious connection attempts.
  • Ensure that only authorized team members can access specific devices.
How It Enhances Security:
  • Prevents unauthorized external access attempts.
  • Ensures device connections remain within approved teams.
  • Reduces vulnerabilities related to external threats.

Access Logs and Monitoring

Maintain Transparency with Detailed Activity Logs

Every remote session, login attempt, and user interaction is recorded in detailed session logs. Administrators can track activities, review past sessions, and export logs for audits or compliance checks.

How It Enhances Security:
  • Provides full transparency of remote activities.
  • Simplifies compliance audits and internal reviews.
  • Identifies anomalies or suspicious activities promptly.
Key Capabilities:
  • Track user login and logout activities.
  • Monitor session start and end times.
  • Log details of devices connected during remote sessions.
  • Export activity logs in CSV format for detailed analysis.

Gestion du contrôle des comptes d'utilisateurs (UAC)

Handle Administrative Tasks Without Interruptions

TSplus Remote Support enables seamless interaction with User Account Control (UAC) prompts during remote sessions. This ensures agents can perform administrative tasks without losing session access.

Key Capabilities:
  • Restart the Remote Support client with administrative privileges during a session.
  • Interact with UAC screens securely without requiring end-user intervention.
  • Execute elevated tasks without session disruptions.
How It Enhances Security:
  • Ensures administrative operations are securely authorized.
  • Prevents accidental elevation of unauthorized commands.
  • Streamlines critical administrative tasks during remote sessions.

Infrastructure de relais mondiale

Optimized Connectivity with Worldwide Relay Servers

All connections are routed through globally distributed relay servers, ensuring fast, reliable, and low-latency remote sessions. These servers are directly managed by TSplus to guarantee consistent performance.

How It Enhances Security:
  • Ensures administrative operations are securely authorized.
  • Prevents accidental elevation of unauthorized commands.
  • Streamlines critical administrative tasks during remote sessions.
Key Capabilities:
  • Ensures administrative operations are securely authorized.
  • Prevents accidental elevation of unauthorized commands.
  • Streamlines critical administrative tasks during remote sessions.

Prêt à vous lancer ? Commencez votre essai gratuit dès aujourd'hui.

Essayez TSplus Remote Support pendant 15 jours. Toutes les fonctionnalités sont incluses.