Five Ways to Restrict User Access

For IT administrators in the retail, financial and government sectors, security is often a top priority. Given the sensitive nature of the data these organizations…

For IT administrators in the retail, financial and government sectors, security is often a top priority. Given the sensitive nature of the data these organizations collect and store, they can’t afford to incur a security breach. As such, they will go to great lengths to protect their interests.

When it comes to remotely managing technology assets, remote control solutions undoubtedly improve efficiencies, but they can vary significantly in their security capabilities. Where some solutions simply rely on password protection, others require user acceptance to establish a connection. But the most secure solutions – like Impero Connect – offer multiple layers for preventing unauthorized access to target devices:

  • Using MAC/IP address checks, target devices will only accept invitations from a service representative whose address appears in a predefined MAC/IP list.
  • With closed user groups, companies can obtain a custom serial number to the software used by service desk representatives and target devices. Then, only in situations when the serial number of the service desk representative’s machine matches that of the target device can a connection between the devices be established. Other attempts will automatically be rejected.
  • Impero Connect can integrate with the authentication scheme currently deployed across a company’s network. This includes Microsoft Active Directory as well as RSA SecureID, RADIUS and Microsoft Azure multi-factor authentication. Integrating with the existing authentication scheme provides a secure method for the service representative to identify itself to the target device.
  • With callback, the target device can call the service representative. This requires the service desk representative to be at a specific location, which is yet another obstacle to prevent intruders. Callback is especially relevant in industries where many systems are connected through modems, such as retail stores, banks and gas stations.
  • When user-controlled access has been configured, a pop-up window appears on the target device asking the end-user whether they want to accept an incoming request from the service representative. A remote control session cannot be established until accepted by an end-user.

These techniques for restricting access represent one aspect of Impero’s comprehensive security capabilities. For more information, visit our Security page.

Become a subscriber today!

Subscribe to our blog today to receive all of the latest updates.

Name(Required)
This field is for validation purposes and should be left unchanged.