Remote maintenance software with SSL & TLS for more security

Remote maintenance software with SSL & TLS for more security

Share post

ProSoft announces a new version of its NetSupport Manager remote maintenance software with enhanced security features. Version 14 offers more flexibility and security through gateway encryption with SSL/TLS certificates.

IT security expert and Trusted Advisor ProSoft presents the new major release v14 of NetSupport Manager - a high-speed solution for secure remote maintenance and remote control of servers, workstations and smart devices from the UK software developer of the same name. As a NetSupport Premier Partner, ProSoft offers training, support and consulting in addition to the software. "The cross-platform remote control software solution now includes a whole range of new and improved functions to minimize support time and significantly increase users' online security," says Robert Korherr, Managing Director of ProSoft GmbH.

End-to-end remote security

“Remote maintenance always means access to a company's computer, network and data. The safety technologies have therefore been further optimized in the new version,” says Korherr. The new version 14 has been developed in direct cooperation with companies to meet their current and changing requirements. The new features are as follows: To increase login security and prevent access attempts by unauthorized users, NetSupport Manager Version 14 supports both RADIUS authentication and Two Factor Authentication (2FA).

NetSupport Manager already offers local LAN/WAN support over IP, as well as flexible HTTP communications through its gateway component, which can be hosted on an organization's premises or on a private cloud. This further protects an organization's data and ensures that it remains fully under their control without the need to use third-party services.

New gateway encryption on board

New gateway encryption with SSL/TLS certificates has been added in the latest software update to increase data security, while security measures such as gateways, security keys and operator passwords have been strengthened with higher encryption levels. To help protect personal information, client log files can be edited to show only selected information. For example, to protect personal data in customer databases, user names must be hidden from the eyes of operators.

Automatic connections save time

In addition, the new load balancing gateways now proactively manage incoming connections and automatically distribute them across multiple gateways to avoid a single point of failure. This is especially useful for larger companies as it ensures consistently maximum performance and reliability without the need for operator intervention.

More at ProSoft.de

 


About ProSoft

ProSoft was founded in 1989 as a provider of complex software solutions in the large computer environment. Since 1994 the company has focused on network management and IT security solutions for modern, heterogeneous Microsoft Windows infrastructures, including Mac OS, Linux as well as mobile environments and end devices. The experts manage efficient software and hardware for corporations and medium-sized companies and have established themselves as specialists for IT security. In addition, as a value-added distributor (VAD), ProSoft supports manufacturers with the “go-to-market” and the launch of new solutions in the German-speaking part of Europe.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more