Features Archives - RealVNC® Remote access software for desktop and mobile Tue, 20 Feb 2024 16:09:14 +0000 en-US hourly 1 https://www.realvnc.com/wp-content/uploads/2023/05/cropped-realvnc-favicon-32x32.png Features Archives - RealVNC® 32 32 RealVNC Receives ISO27001 Certification: What It Is and Why It Matters https://www.realvnc.com/en/blog/realvnc-iso27001-certification-what-it-is-why-it-matters/ Thu, 11 Jan 2024 07:24:25 +0000 https://www.realvnc.com/en/?post_type=blog&p=30006 As a global innovator in remote access solutions, RealVNC has recently achieved this important certification—a significant milestone in our commitment to data security. Let's dissect what it all means.

The post RealVNC Receives ISO27001 Certification: What It Is and Why It Matters appeared first on RealVNC®.

]]>

With cybersecurity threats becoming more complex every day, there has never been a more stringent need for robust data protection. One term that’s frequently mentioned in these discussions is ISO27001 certification. But what does it mean? And why should it matter to you?

What Exactly is ISO27001 Certification?

ISO27001—it sounds like a complex code, doesn’t it? It isn’t, actually. This international standard simply refers to Information Security Management Systems (ISMS). Think of it as a “seal of approval” that attests to a company’s system of managing risks related to data security.

When a company displays an ISO27001 badge, it’s making a statement. It says that it has met the rigorous requirements of this standard. It also means that it’s committed to upholding the highest standards of information security, data protection, and compliance with legal and regulatory norms.

The RealVNC Advantage: Going the Extra Mile

So, what does RealVNC’s recent obtaining of the ISO27001 certification mean for you? Simply put, it’s evidence of our commitment to data security.

This certification isn’t just another accolade. Instead, it serves as concrete proof that we’re serious about safeguarding your data. We’re not satisfied with providing industry-leading remote access solutions; we’re equally committed to ensuring operational excellence, resilience, and security against cyberattacks.

In the words of our Chief Information Officer, Andrew Woodhouse:

ISO 27001 certification reinforces that security is at the forefront of everything we do, not only in the products we build but how we operate as a business. This further solidifies RealVNC’s position as the world’s most secure remote access solution and gives our customers confidence that we go above and beyond to protect their information and maintain the confidentiality, integrity, and availability of data. We are proud to join an exclusive group of global organizations renowned for their advanced information security practices. 

The Takeaway: Why Should You Care?

Why should RealVNC’s ISO27001 certification matter to you? The answer lies in the assurance it provides. This certification gives you the confidence that your data is in safe hands—a company that doesn’t just meet basic security requirements, but goes above and beyond to protect your information.

This achievement places us alongside a select group of global organizations known for their rigorous information security practices. 

The post RealVNC Receives ISO27001 Certification: What It Is and Why It Matters appeared first on RealVNC®.

]]>
A Look Back at RealVNC’s 2023 Milestones: The Yearly Roundup https://www.realvnc.com/en/blog/a-look-back-at-realvncs-2023-milestones/ Fri, 22 Dec 2023 17:39:02 +0000 https://www.realvnc.com/en/?post_type=blog&p=29944  2023 unfolded with a host of exciting enhancements to the RealVNC Connect software, as anticipated. Aside from that, we hosted a contest showcasing the creative side of our users. Plus, we offered an in-depth analysis of the remote access industry. Dive in to explore the significant landmarks that defined RealVNC's year.

With that said, let's dive into some of the most important moments of what has been a very busy year here at RealVNC. 

The post A Look Back at RealVNC’s 2023 Milestones: The Yearly Roundup appeared first on RealVNC®.

]]>

2023 unfolded with a host of exciting enhancements to the RealVNC Connect software, as anticipated. Aside from that, we hosted a contest showcasing the creative side of our users. Plus, we offered an in-depth analysis of the remote access industry. Dive in to explore the significant landmarks that defined RealVNC’s year.

With that said, let’s dive into some of the most important moments of what has been a very busy year here at RealVNC.

RealVNC Connect: new features and enhancements

It has been a great 2023 for our flagship software, RealVNC Connect, as it has received some great improvements. Let’s look at some of them.

Presence for RealVNC Viewer

Our Presence feature provides you with a convenient way to check which ones of your cloud-connected devices are ready to connect, simplifying your workflow. If you see a green icon, it means that the device is online and open for connections. A grey icon indicates that the device is offline and not accessible. It’s a straightforward feature, that should make many system administrators’ lives easier.

Session recording on On-Demand Assist

You can now document your On-Demand Assist sessions, facilitating your audit processes and training programs. All you need to do is click the ‘Rec’ icon on the toolbar while in a session. This will record what’s happening on your screen and save it to a location of your choosing.

Native integration for Duo Authentication

Protecting your sessions with the Duo Authentication method is now easier than ever before.

Our native integration lets you directly link RealVNC Connect with your Duo account, making it quicker to set up and easier to implement.

Session logging with Audit

This feature will spare your team from a lot of admin work, by giving them a 14-day running log of key account events. Complete with timestamps and dates, you have a fully auditable, real-time log of activity. This can be exported as a .csv file or via API Access.

The 2023 State of Remote Access Report

The State of Remote Access Report is based on a comprehensive remote access survey, with over 450 respondents.

This extensive survey deciphers the technologies used to enable and secure remote access. The resulting report offers valuable insights into the practical usage of these technologies, security protocols, and their effectiveness against prevalent cyberattacks. It’s designed to give you a complete overlook of the remote access, as well as insights that will keep you ahead of your competitors.

If you haven’t done so already, download your free copy of the 2023 State of Remote Access Report here

Also, keep an eye on the RealVNC Blog and our social media presences in the new year! A brand-new report, discussing the way remote access will look and how it will be used in 2024, is on the way.

The 2023 RealVNC Raspberry Pi Prize

Thousands of people use RealVNC Connect in creative ways on Raspberry Pi devices every day. This competition was meant to recognize them and celebrate their ingenuity and creativity. It was open to anyone who had an original solution that included the use of a Raspberry Pi computer and RealVNC Connect software.

We received entries from around the world and have been extremely impressed by the creativity and ingenuity on display.

Six finalists were selected, and the judges have assessed their entries for originality & innovation, quality of design, impact, as well as the use of RealVNC Connect remote access software. The overall winner has received a prize of $1,000, while the runners up have received $500 and $250, respectively.

Shohreh Kia was the winner of the competition, with a solution that uses a Raspberry Pi connected to a camera to process real-time visual data from conveyor belts in recycling centers. Material types on the belts are identified using custom-developed algorithms. RealVNC Connect allows operators to operate the machines remotely in a much safer and healthier environment.

You can find out all about the winning solution, as well as the runners-up, on the RealVNC Blog

Happy holidays and a great 2024!

The ones discussed above are just some of the highlights of what has been a very busy, but at the same time very successful, 2023 for the RealVNC team.

We all want to thank you for using our products this year. We also want to take this opportunity to wish you Happy Holidays and a fantastic 2024! See you next year!

The post A Look Back at RealVNC’s 2023 Milestones: The Yearly Roundup appeared first on RealVNC®.

]]>
The 2023 RealVNC Raspberry Pi Prize Winner & Runners-Up https://www.realvnc.com/en/blog/2023-realvnc-raspberry-pi-prize-winner/ Mon, 06 Nov 2023 07:03:06 +0000 https://www.realvnc.com/en/?post_type=blog&p=25448 A winner and two runners-up have been chosen for the 2023 RealVNC Raspberry Pi Prize!

The post The 2023 RealVNC Raspberry Pi Prize Winner & Runners-Up appeared first on RealVNC®.

]]>

The competition was launched six months ago, and open to anyone who had an original solution that included the use of a Raspberry Pi computer and RealVNC Connect software. We received entries from around the world and have been extremely impressed by the creativity and ingenuity on display.

Six finalists were selected in September, and the judges have since assessed their entries for originality & innovation, quality of design, impact, as well as the use of RealVNC Connect remote access software.

The overall winner will receive a prize of $1,000, while the runners up will receive $500 and $250. respectively.

Here are the results:

WINNER: Shohreh Kia (Germany)

Additional Team Members: Prof. Benjamin Leiding, Prof. Daniel Goldmann, and Alexander Gaun

Entry name: Conveyor Belt Monitoring

Shohreh Kia RealVNC Raspeberry Pi Prize

This solution uses a Raspberry Pi connected to a camera to process real-time visual data from conveyor belts in recycling centers. Material types on the belts are identified using custom-developed algorithms. RealVNC Connect allows operators to operate the machines remotely in a much safer and healthier environment.

After taking a job at a recycling plant to earn extra money during her studies, Shohreh was inspired to create technology that would help people working in unhealthy conditions enjoy the benefits of remote working. After creating this first solution as part of her master’s degree, she is now creating more remote access technology for other types of recycling plant machines as part of her PhD. Her goal is to one day launch a company that improves the lives of people working in dangerous conditions around the world.

Read Shohreh’s finalist profile 

1ST RUNNER UP: Kunikatsu Takase (Japan)

Additional Team Members: Hironobu Takahashi and Takashi Yoshimi

Project name: Teleoperation of a Robotic Grabber for Personal Use via Internet

 

Kunikatsu Takase robot carer

Designed to be used in hospitals or to provide patients with care at home, the robotic grabber can pick up objects, carry them to a patient’s bedside and release them.

A Raspberry Pi controls the grabber, which has three articulation points, two grabbing fingers, as well as a monitoring camera. RealVNC Connect enables operators to assist patients remotely, allowing the carers to help patients in quarantine to receive better care, or possibly reduce the need for some in-person visits to patients in receiving care at home. 

Care provision, whether at home or in an instructional setting, is a growing challenge in many countries around the world. A solution which helps care workers provide help faster and more efficiently could have an enormous impact on everyone’s future.

Read Kunikatsu’s finalist profile

Mikhail Grushinskiy (United States)

Entry name: Bareboat Necessities Marine OS for Raspberry Pi

Bareboat Necessities for Marine OS is a free and open-source Debian-based system for Raspberry Pi computers which is integrated with essential software for boat operation and navigation (as well as a host of other useful applications). RealVNC Connect is installed by default and allows boat operators access to the system via a tablet or monitor.

A true inventor, Mikhail came up with the idea for a specialist operating system after buying a small sailboat and discovering that there was no available solution that fit his needs. Bareboat Necessities provides sailors with access to everything from navigation charts to weather reports to Facebook. By operating on a Raspberry Pi, the system has very low power consumption – ideal for small boats with limited battery supplies. Since its launch a few years ago, Mikhail’s OS has been enthusiastically adopted by sailors on all types of crafts, all over the world.

Read Mikhail’s finalist profile

On behalf of the judges and everyone at RealVNC, we would like to thank everyone who has helped make the 2023 RealVNC Raspberry Pi Prize a huge success, and especially all those who took the time to share their solutions with us!

The post The 2023 RealVNC Raspberry Pi Prize Winner & Runners-Up appeared first on RealVNC®.

]]>
How to send CTRL-ALT-Delete using a remote desktop? https://www.realvnc.com/en/blog/send-ctrl-alt-delete-in-rdp/ Wed, 14 Jun 2023 07:51:58 +0000 https://www.realvnc.com/en/?post_type=blog&p=19592 There might be times when you need to open Task Manager on a remote desktop or terminate a remote desktop that needs starting up. This functionality is particularly useful for IT teams managing multiple devices. In this article, we'll discuss several methods to send the CTRL-ALT-Delete command on a remote desktop, depending on the operating system you're using.

The post How to send CTRL-ALT-Delete using a remote desktop? appeared first on RealVNC®.

]]>

What is remote infrastructure management?

What is a remote access VPN?

A guide to end to end encryption (e2ee)

For Windows Users

Method 1: Using the CTRL-ALT-END Shortcut

Instead of the traditional CTRL-ALT-Delete command, Windows users can utilize the CTRL-ALT-END shortcut to send the same command to the remote desktop. This method works seamlessly and is a straightforward option for Windows users.

Method 2: Using the On-Screen Keyboard Feature within the RDP

Another option for Windows users is to use the on-screen keyboard feature within the Remote Desktop Protocol (RDP). To do this, follow these steps:

  1. Open the remote desktop connection.
  2. Click on “Start” and search for “On-Screen Keyboard.”
  3. Open the on-screen keyboard and press the CTRL, ALT, and DEL keys simultaneously.

For Mac Users

Method 1: Using the Command + Option + Escape Shortcut

Mac users can send the CTRL-ALT-Delete command on a remote desktop by pressing the Command + Option + Escape keys simultaneously. This will bring up the “Force Quit Applications” window, allowing you to manage the remote desktop applications.

Method 2: Going to Actions -> Control Alt Delete

Another method for Mac users is to use the built-in feature within the remote desktop application. To do this, follow these steps:

  1. Open the remote desktop connection.
  2. Locate the menu bar at the top of the screen.
  3. Click on “Actions” and then select “Control Alt Delete” from the dropdown menu.

Using VNC Connect

VNC Connect enables users to send CTRL-ALT-Delete commands on both Windows and Mac operating systems. To use this feature, simply follow these steps:

  1. Install and open VNC Connect on your computer.
  2. Connect to the remote desktop.
  3. Locate the menu bar at the top of the screen.
  4. Click on “Actions” and then select “Send Ctrl-Alt-Del” from the dropdown menu.

By following the methods mentioned above, you can easily send the CTRL-ALT-Delete command on a remote desktop, whether you’re using a Windows or Mac operating system.

If you’re looking for a reliable and user-friendly remote desktop solution, consider using RealVNC Control Alt Del Remote Desktop. With its intuitive interface and powerful features, managing remote desktops has never been easier.

Start a free 14-day trial of VNC Connect now!

The post How to send CTRL-ALT-Delete using a remote desktop? appeared first on RealVNC®.

]]>
What is a Remote Viewer and How to Find the Best Software https://www.realvnc.com/en/blog/remote-viewer/ Fri, 19 May 2023 08:26:22 +0000 https://www.realvnc.com/en/?post_type=blog&p=18152 Remote viewing has become an essential tool for anyone who needs to access and control a computer or network remotely. With the right remote viewer software, you can easily access files, software, and other resources from anywhere, as long as you have an internet connection.

The post What is a Remote Viewer and How to Find the Best Software appeared first on RealVNC®.

]]>

But with so many different remote viewer software options available, choosing the best one for your needs can take time. In this article, we’ll examine what a remote viewer is and its benefits. We’ll also provide tips on what to look for when choosing remote viewer software and highlight the strengths of RealVNC® software. 

What is a remote desktop or PC viewer and what does it do? 

A remote desktop or PC viewer is a tool that allows users to connect to and control a computer or desktop remotely. It enables users to access files, applications, and other resources on a computer physically located elsewhere. 

Remote desktop software operates by transmitting the user’s keyboard and mouse actions to the remote computer and receiving the results back to the local machine. 

The main reasons why using remote viewers can improve your workplace workflow

There are plenty of ways a remote viewer can improve your workflow, but the following points are the ones that really stand out.

You can access your office computer even when you’re away

When unforeseen circumstances pop up – or even foreseen ones (like a vacation) –  having access to your office computer can give you peace of mind. And the best way to do that? A remote viewer or remote connection that allows you to access your office computer, all from the comfort of wherever you happen to be.

You can demonstrate a process quickly and easily 

Remote viewers facilitate communication between team members in different locations. This is great if your business has employees in multiple locations, allowing for better collaboration on projects. Employees can demonstrate new processes quickly and easily by sharing screens – perfect for training new employees or preparing for presentations.

You can repair your computer remotely 

A remote connection is an invaluable tool for repairing a computer remotely. With remote desktop software that has features like on-demand assist, a technician can access your computer and resolve technical issues without being physically present. This can be particularly useful when you can’t bring your computer to a repair center or a technician is far from your location. 

You can perform administrative work more efficiently 

Remote desktop software can be particularly useful for administrative tasks involving accessing files, databases, or applications only available on specific computers. It allows you to access these resources from anywhere, at any time. 

As we mentioned, remote desktop software can facilitate collaboration between team members. This can be particularly helpful for administrative tasks that involve working on large or complex projects with multiple stakeholders, as it allows multiple individuals to access and work on the same computer simultaneously. 

What to look for in remote viewer software 

When deciding on which software to choose, there are a few key things you should consider: 

Purpose—external or internal use? 

Remote viewer software can be used both externally and internally:

  • Externally: businesses can use remote viewer software to allow remote access to their systems, applications, or services by their customers, partners, or vendors. 
  • Internally: companies or teams can use remote viewer software to simplify collaboration and remote work. It can help employees access their work computers, files, and applications from anywhere, at any time.

Each use case will have slightly different needs – for instance, if you plan to use a remote viewer externally, you need one accessible via a browser rather than one that requires a software download. Understanding the purpose you want to use it for can help you make the right choice.

Necessary features 

Productivity tools

Look for productivity tools like screen recording, real-time chat, file sharing, remote printing, and more. The more your software can do, the fewer additional tools you’ll need from other programs.

Optimized performance

Your software solution should ensure optimal performance, even with less-than-great internet connections. Look for high-quality connection capabilities and extras like HD audio.

Enterprise-grade security 

High-end, enterprise-grade security is a must when choosing remote viewer software. Make sure all sessions are encrypted and permission controls are highly customizable. 

Fast deployment

When choosing a remote access software solution, look for a system that’s easy to download and install and can quickly be deployed across your organization. You don’t want to waste valuable time on software that’s slow to implement.

Guaranteed security 

As we’ve mentioned, enterprise-grade security is a must. Since remote viewer software can access and control a computer or system in a different location, there’s a risk of hacking, malware, and other cyber threats.

Strong security in remote viewer software can help protect sensitive data from unauthorized access and ensure the privacy and confidentiality of remote access sessions. It should include encryption, authentication, authorization, and audit logging. Importantly, it should also ensure compliance with security standards and regulations.

Supported devices 

Users access and work on different devices and platforms, so remote viewer software should be flexible. For example, you want to invest in software that supports both a Windows and a Mac remote viewer, rather than having two separate systems in place.

Software that supports a range of devices is particularly helpful if you have a BYOD (bring your own device) policy in place. As users can choose their favorite device and platform, like VNC remote control from PC to Android, to have the ultimate flexibility when working outside the office.

Cost-effectiveness

For individuals, remote viewer software can save time and money on transportation and other expenses. It can also enable remote workers to work from home or other remote locations, reducing the need for commuting.

For organizations, remote viewer software can provide cost savings by reducing the need for on-site support and maintenance. As well as reducing the amount of office space required for on-site workers, it can help improve productivity via remote monitoring and management of systems and applications.

Usability 

As with any software, you want something with a user-friendly and intuitive interface that will allow you to use it without extensive training or technical expertise.

One of the many advantages of choosing to work remotely with VNC Connect is that it is easy to set up. There’s no need to understand IP addresses, as once it’s set up, you can simply sign in and access any devices you have permission for. This usability can enhance productivity and efficiency, as users can focus on their work rather than the technology.

Customizability  

Remote viewer software should be customizable, allowing users to personalize it to meet their specific needs and preferences. Whether that’s choosing specific security policies or deciding on a LAN or cloud-based connection, having options is key. 

Beyond solving IT problems—do more with VNC Connect on your desktop 

Remote viewer software is an essential tool for anyone who needs to access and control a computer or network remotely. By using the right remote viewer software, you can save time, improve productivity, and work from anywhere in the world.

A good option, when it comes to remote viewer software, is VNC Connect remote access. Not only can you troubleshoot IT problems from just about anywhere, but you can enable hybrid working setups for yourself and your team, streamline customer service, and simplify collaboration. 

Just look at what the University of Miami did with the help of VNC Connect. The Meteorology and Physical Oceanography department needed a solution to replace the need for a person to be physically present onboard their research vessels when conducting research measuring hurricanes, climate, ocean modelling, and satellite remote sensing. 

With RealVNC remote access software installed on the equipment, researchers can access the software to diagnose and repair issues remotely at any time. Additionally, equipment is housed at several remote research stations around the world. Research staff can collect data around the clock, enabling real-time monitoring and maintenance without having to physically travel. Proof that with the right remote viewer software, you can work more efficiently and effectively from just about anywhere.

FAQs about remote viewers 

How do I view the event log of a remote computer?

Viewing the event log of a remote computer with remote viewer software is pretty simple. To view the event log of a remote computer:

  1. Open your remote viewer software and connect to the remote computer.
  2. Once connected, open the Event Viewer application on the remote computer and click Run as administrator.
  3. Navigate to the event log you want to view, such as the Application or System log.
  4. Select the events you wish to view and examine the details.
  5. Close the Event Viewer and disconnect from the remote computer when finished.

What are the four main ways to access a computer remotely?

There are several ways to access a computer remotely, but four of the main ways are:

  1. Your computer’s operating system. Most operating systems come with a baseline remote connection function. If you’re using Windows, this would be the NET SHARE command in DOS. If you’re using a Mac, you can connect remotely using commands in Terminal.
  2. Built-in tools. Windows remote desktop software, also known as Remote Desktop Protocol, or RDP is a built-in tool to connect remote computers. This can connect any two computers running Windows. However, it only has basic functionality.
  3. Browser. With a tool like Chrome Remote Desktop, you can connect two computers as long as the Chrome extension is installed on both devices.
  4. Remote desktop software. This is the most secure option for connecting devices remotely. It also comes with more features than any other remote access option and gives you more customization.

What is required for remote access? 

To have a remote computer access, you typically need three things:

  1. A computer or device with an internet connection to access the remote computer.
  2. A way to connect to the other computer. Remote access software, which can be built into some operating systems or installed separately, is one option.
  3. Permission from the remote computer owner, which is usually granted through a password or user account.

Is remote access the same as VPN? 

Remote access and VPN are different technologies, but they both allow secure remote connectivity. Remote access typically refers to the ability to remotely access a specific computer or device over the internet, while VPN (Virtual Private Network) refers to the creation of a secure, encrypted connection between a user’s device and a private network, like a company’s internal network. 

While remote access is typically used for accessing a specific device, VPN is used for secure access to an entire network. So, while they serve different purposes, they can both be used to enable remote access to a computer or network.

The post What is a Remote Viewer and How to Find the Best Software appeared first on RealVNC®.

]]>
Your Guide to Remote Computer Access and its Benefits   https://www.realvnc.com/en/blog/remote-computer-access/ Fri, 19 May 2023 07:37:08 +0000 https://www.realvnc.com/en/?post_type=blog&p=18173 Remote computer access connects a computer you’re using with a computer or network in a different location.

The post Your Guide to Remote Computer Access and its Benefits   appeared first on RealVNC®.

]]>

Once used primarily by IT teams for customer support, businesses quickly leverage remote access tools to grant employees remote access to company computers, networks, and files. Employees can access company resources from, for example, their home office computer or mobile device while working from home or on the go.

Remote access presents many benefits, including boosted productivity and workplace flexibility. However, there are also some security risks to be aware of.

Before we get into the best practices and benefits of using remote desktop software, let’s start by exploring how remote desktop access works.

How to remotely access another computer and increase efficiency in the workplace

If you want to get remote access to another computer in another location, such as your work computer, you need a remote computer access tool like VNC Connect.

What is VNC? VNC stands for Virtual Network Computing, and it is a remote access platform designed to help businesses meet the demands of remote working. Most critically, it lets remote users securely connect to workplace computers.

High-quality remote access software typically follows the same process as VNC Connect to facilitate secure remote access. Here’s a general example of how to remote access a computer:

  • Remote desktop access software is installed on both local and remote computers.
  • The remote user’s identity must be authenticated before access is permitted. Your business’s identity and authentication system handles this through your chosen authentication method (password-based, certificate-based, multi-factor authentication, etc.).
  • Predetermined access rules, such as device and time restrictions, permitted actions, etc., are enforced.
  • Provided the user has been authenticated, they can access systems within your company’s network in alignment with your access controls.
  • These remote sessions are encrypted, recorded, and monitored in real-time for anomalous or suspicious activity. Should the admin team or access software spot suspicious remote sessions, activities, or login attempts, these can be flagged, blocked, and shut down immediately.

7 Useful guidelines for using remote access to computers

There are a few best practices to remember when setting up remote access for your organization. Unsurprisingly, most of these best practices are related to security, as remote access can pose security risks without care and proper implementation.

  1. Utilize strong passwords and two-factor authentication

Employees with weak passwords are easy targets for hackers. To prevent a data breach from devastating your business, enforce a firm password policy with strict rules regarding character length, case combinations, numbers, and special characters. It would help if you also encouraged employees to use a unique password for every account. 

Of course, remembering multiple strong passwords isn’t easy for most of us. Password manager tools ease this process. They can generate and securely store complex passwords, effortlessly increasing your employee’s password hygiene. And if you’re feeling extra keen today and want to flex those security muscles, check out our five great ways to strengthen your password blog – it won’t disappoint.

Along with strong passwords, implement two-factor authentication as an additional security measure. Two-factor authentication prompts a user to provide two distinct pieces of identification. So, along with the typical username and password pair, an employee may also need to give a unique PIN that was sent to them via SMS or the answer to a secret question. And we’re not going to leave you hanging here – we’ve got your back with our three reasons why MFA needs to be a part of your remote access strategy blog to take you a little further.

  1. Employ a reliable VPN

A virtual private network (VPN) is necessary for two critical reasons. Firstly, it protects your remote workers, encrypting their data transmissions and facilitating secure, high-speed connectivity. And second, VPNs protect your company’s network from lurking cyber threats.

Along with man-in-the-middle attacks (a type of cyberattack in which hackers eavesdrop or intercept communications or data transfers), there’s also the threat of malware distribution.

Using a VPN is vital for employees using public Wi-Fi in airports, hotels, coffeehouses, etc. – because connecting to public Wi-Fi for remote access leaves your remote desktop server and data transmissions vulnerable to cyberattacks.

Additionally, for a thought-provoking read, the IT Pro part of you may want to see what you think about our blog on three reasons why it’s time to ditch your “VPN/RDP” strategy – let us know!

  1. Carry out frequent security audits

Comprehensive security audits are necessary for evaluating the robustness of your company’s remote access security. They can help uncover vulnerabilities and alert you to potential risks. An audit for remote access should concentrate on areas such as:

  • Remote device testing: This should encompass both company-provided devices and those used under a BYOD (bring your own device) policy
  • Configuration auditing: Including all critical resources to verify consistency with the latest security baselines
  • Authentication analysis: Logins to VPNs, company resources, etc
  • User activity monitoring: Across cloud solutions and particularly around sensitive data
  • Port scans and failed login attempts
  • And user permissions.
  1. Invest in dependable antivirus software

Install antivirus and anti-malware on all your endpoint devices to improve your security and meet regulatory compliance. Antivirus protects your company’s endpoints from being infected by malware and reduces the risk of staff devices being subject to viruses in the first place.

It’s also essential to ensure consistency of antivirus software – so if you have a BYOD policy, mandate a particular software that everyone must use.

  1. Train your staff about cybersecurity procedures

According to the most recent report by the World Economic Forum, 95% of cybersecurity issues can be traced back to human error. When all it takes is a minor slip-up to become the victim of a data breach or malicious attack, security awareness education is a powerful tool to weaponize.

Create a security-first culture in your company by training and educating employees on remote computer access risks and procedures. Include security awareness as a module in your onboarding process and continuously update current employees on the latest cybersecurity threats and company procedures.

  1. Upgrade software and firmware consistently 

Outdated software and firmware pose significant cybersecurity risks. As well as improving the functional performance of your applications, prompt updates and patches fix security vulnerabilities and mitigate the success of cyberattacks.

Unpatched vulnerabilities are easily exploited by cybercriminals who use these weak spots to perform malicious activities. Using remote access to manage desktop devices means that you can push updates as needed rather than relying on your team to remember to do it.

  1. Create thorough remote access policies and guidelines

A remote access security policy is essential for governing remote computer access activities. It should clearly establish which employees have remote access privileges and dictate the conditions for utilizing them, such as when and how remote activities are to be conducted.

Along with access and authentication rules, your remote access policies should cover areas like antivirus requirements, device policies, encryption standards, sensitive information policies, and trusted vs. untrusted sources.

How can accessing a remote desktop benefit your business? 

With all the security best practices in mind, here’s how remote desktop access benefits your business.

Create and maintain a flexible work-life balance

Remote desktop technology empowers employees to work from home and thus benefit from a healthier work-life balance. Not only are they free of the lengthy commute to the office, but employees can fit their work around their personal schedules thanks to the increased flexibility that remote working permits.

Flexible working is a leading motivator for staying in a job, according to a recent study by WorkHuman and Gallup. A flexible work-life balance drives job satisfaction and happiness, improving retention rates.

Offer accessibility anytime and anywhere

With the power to hire remote workers, you can source high-quality talent from anywhere globally. Giving employees remote access to work computers from anywhere means they can perform work tasks from any location at any time.

Employees can access your business computers and networks with the same real-time efficiency and visibility as in the office, whether they’re fully remote or just travelling between offices.

Safeguard the data security of your company

The emergence of remote access technology has presented businesses with more ways to protect the integrity and security of company data. With more insight into your company’s cybersecurity environment, you can create and enforce strict authentication and permissions rules. This approach can help reduce the chances of data breaches.

Maximize employee productivity

Maximize your employees’ productivity by letting them access company resources whenever needed. Instead of visiting the office or jumping through hoops with colleagues, they can – and securely – log in to your company’s network and collect the information they need, regardless of their physical location.

Thanks to this increased accessibility, employees can efficiently finish tasks on time and to a higher quality.

Leverage remote computer access without exceeding your budget

Remote work environments are incredibly cost-effective for small teams. You don’t have to purchase volumes of expensive hardware, as employees can bring their own devices. And with no physical office, there’s no need to pay for overheads or equipment maintenance.

The same goes for large businesses and enterprises, too. Remote access is a budget-friendly implementation with long-term financial benefits, including reduced hiring, tech, and overhead costs.

Of course, there are some remote access considerations to be aware of while you’re choosing the right software for your company. Consider the platforms you need to support and any performance or security features you need to meet your business goals. 

With VNC Connect, depending on your subscription, you can get unlimited users and concurrent sessions, file transfer, remote audio, multi-factor authentication, and more.

Improve your business efficiency and productivity with secure remote computer access 

Remote access empowers teams to collaborate, communicate, and access company resources from anywhere in the world. To truly make the most out of remote desktop capabilities, you need a remote computer access platform that prioritizes security, simplicity, and efficiency.  

VNC® Connect allows your entire workforce to connect to workplace computers from any remote device. Equipped with enterprise-grade security features, you can customize security policies, strengthen authentication processes, and protect your business from threats – all while improving productivity.

As a multi-platform solution with tightly-woven connectivity, VNC Connect empowers teams to collaborate, communicate, and access the information they need from anywhere. 

FAQs about remote computer access

Which apps are used for remote access?

You can download various apps to gain remote access, and which works best will depend on your needs. While some apps like Microsoft Remote Desktop often come on devices for free, they’re usually limited in scope and lack some of the more substantial features you might need. RealVNC’s offerings can be tailored to fit your business needs, covering all your remote access needs. It’s worth diving into our ‘VNC vs RDP: which remote desktop tool is the best?’ blog, as it will give you more insight into choosing the correct setup for your organization.

Can someone access my laptop remotely without me knowing?

In short, with good anti-virus and anti-malware software in place, there should be no way for someone to access your device without you knowing about it. While there are potential breaches that could allow it, when it comes to using remote access software, you’re in control.

With RealVNC’s solutions, you can set up ‘connection approval’, which means you have to authorize any attempts to connect to your laptop remotely.

With VNC Connect, the user is the one that ultimately decides who gets to connect. The owner of the remote computer ultimately decides who is able to connect.

Which tool is used to connect a remote computer?

VNC is built on a client/server architecture. The server component is installed on the remote device you want to access (e.g., your work computer), and the client is installed on the device you want to access the remote device from (e.g., your home computer). Once the client/server connection is initiated and the user is authenticated, they can access and control the computer from their client device.

The post Your Guide to Remote Computer Access and its Benefits   appeared first on RealVNC®.

]]>
A guide to end to end encryption (e2ee) https://www.realvnc.com/en/blog/a-guide-to-end-to-end-encryption-e2ee/ Tue, 21 Feb 2023 10:03:17 +0000 https://www.realvnc.com/?post_type=blog&p=16058 End to end encryption, as well as why it is essential for your data security, are the main topics of this article. We'll talk about the meaning of e2ee, but also about how VNC Connect uses end to end encryption.

The post A guide to end to end encryption (e2ee) appeared first on RealVNC®.

]]>

What is end to end encryption (e2ee)?

Let’s dig into what end to end encryption is and, also, what it can do to keep you and your data secure.

E2ee is, simply put, a data security method that makes sure of one important thing. Namely, only the sender and receiver can access the data sent between them. It prevents any third party from accessing said data as it moves over networks. When we say networks, these could be of any kind, e.g. the internet, local ones, or Wi-Fi ones.

The advantage of e2ee is that, if someone intercepts your data, they wouldn’t be able to decrypt it without both keys, from both parties.

How does end to end encryption work?

Now that we’ve discussed end to end encryption meaning and we know what e2ee does in principle, let’s see how it works.

On a very basic level, the e2ee process starts when a message/data gets sent from a device. The data gets encrypted at the sender’s end, with only the receiver able to decrypt it. Encryption turns the data into ciphertext, essentially an unreadable format. This is called cryptography.

To decrypt the data, the receiving device needs a secret key. That secret key is only stored on that device.

The name of this process is called asymmetric cryptography and it uses a public-private key pair. The sender uses the receiver’s public key (which is available to everyone) to send the message. However, the receiver has both a private and a public key, the two of which are mathematically related. Only the receiver’s private key can decrypt the ciphertext. This is the secret key that we were discussing above.

Due to this, data can travel over various connections and servers and even be intercepted. Without both keys, decryption is not possible.

Also, the keys won’t ever coincide, as the system will create unique ones every time someone becomes part of it.


Get a free 14-day trial!

An E2ee example

If this feels like an abstract concept, you’re not the only one to feel that way. This is why we’ll look at an end to end encryption example.

An example of how to use end to end encryption would involve a tech support agent for a hospital trust.  They’re accessing a computer using secure remote access. As you’d expect, the computer they’re getting into contains sensitive patient data. The last thing they’d want is for this data to end up in the wrong hands.

Also important to mention is that the agent is working from home today and connected to their home Wi-Fi. As their remote access software uses 256-bit AES encryption, the data is end to end encrypted. Therefore, they can rest assured that, due to e2ee, nobody, not even their internet service provider, can access it. Even though their home Wi-Fi password is known by their neighbour, this makes no difference. The neighbour might be able to intercept it, but not decrypt it.

Why end to end encryption is important

In the current age, data privacy is essential. Even if you think you have nothing to hide, that’s still not a reason for others to have access to your information.

Peace of mind is essential, and that’s exactly what e2ee helps with. Most users don’t realize it, but a lot of identity theft situations start from very small bits of information. An attacker might get access to one password, and then use that to get into an email account. From there, they might get to a mobile phone provider account, then a bank account and so on.

Using everything at your disposal to make a malicious actor’s job very difficult is always a good idea. And this goes from e2ee to multi-factor authentication or password managers.

What are the benefits end to end encryption?

Some of the key advantages of end to end encryption are:

Privacy

Using e2ee makes sure that data remains private to only the sender and receiver.

Security

E2ee helps keep your data more secure, as it significantly reduces the risk of it getting stolen while it’s being transmitted.

Protection against man-in-the-middle attacks

Even if an attacker hijacks the communication channel (e.g., a Wi-Fi connection), the data itself is safe. Without the public and private keys, the intercepted data wouldn’t be of much use to an attacker.

RealVNC and end to end encryption

RealVNC builds its product by putting security first. Therefore, end to end encryption is essential for our company.

When using VNC Connect, you can rest assured that your data is protected by encryption.  All connections are encrypted end-to-end using up to 256-bit AES, 2048-bit RSA keys and perfect forward secrecy. This means that sessions are entirely private to you, now and in the future.

Data can’t be decrypted, not even by us at RealVNC. Our use of e2ee is one of the reasons why you don’t need to trust RealVNC to be able to trust and use our product. You can find out more about the security of our product here.

But VNC Connect is not just about security; it’s also about ease of use. And you don’t just have to take our word for it. Click the button below and get a free trial!


Get a free 14-day trial!

The post A guide to end to end encryption (e2ee) appeared first on RealVNC®.

]]>
VNC® Connect 7 is here! https://www.realvnc.com/en/blog/vnc-connect-7-is-here/ Tue, 14 Feb 2023 17:17:47 +0000 https://www.realvnc.com/?post_type=blog&p=16079 VNC Connect v. 7.0.0 is here, bringing with it lots of under-the-hood improvements. The new version also gets things ready for exciting things to come this year.

The post VNC® Connect 7 is here! appeared first on RealVNC®.

]]>

The update includes some new features as well, in addition to behind-the-scenes improvements. The most important ones are as follows:

Let’s take a look at some of these in a bit more detail.

The all-new Lite subscription

Our free (for non-commercial use) plan has been given a complete makeover, replacing the old Home subscription. 

Those using the new Lite plan now get high-speed streaming. Security has also been increased, with the option of 256-bit AES session encryption. 

The Lite plan offers access to three managed devices.  

Existing Home subscribers must keep in mind that these changes only apply to the Lite plan.  They’ll continue to access their Home subscription within VNC Connect 7.x.  

Native support for Apple’s M1 & M2 chip 

We now have native support for Macs with the M1 and M2 chips. This means that you no longer need to use Rosetta to run VNC® Viewer and VNC® Server. 

Offline licensing changes

The way offline licenses are formatted has changed starting with VNC Connect 7.x. However, if you’re currently using offline licensing, 6.x licenses won’t stop working for you. These will keep functioning until their expiry date. 

Make sure you take a look at this article if you need more information.

Instant Support is now known as On-Demand Assist

Our Instant Support feature, which allows you to remotely access anyone’s computer in seconds on demand, without the need to install remote access software, now has a new name. It is now called On-Demand Assist, and continues to include all the features you know and love.  

Don’t miss out on all this! Make sure you download VNC Connect 7 today

The post VNC® Connect 7 is here! appeared first on RealVNC®.

]]>
How RealVNC customers experienced 2022 and what’s next https://www.realvnc.com/en/blog/how-realvnc-customers-experienced-2022-what-is-next/ Wed, 21 Dec 2022 15:16:24 +0000 https://www.realvnc.com/?post_type=blog&p=15447 We're at the end of a very exciting year for both RealVNC and our customers. What follows is a look back at the year through a RealVNC customer's eyes.

The post How RealVNC customers experienced 2022 and what’s next appeared first on RealVNC®.

]]>

Let’s see, then,  how all the RealVNC news and events of 2022 have been for them. 

RealVNC turns 20

“It would seem like I’ve been working with RealVNC for a very long time, so much has VNC Connect become a fabric of our daily life. We’ve been using it for a long time to support our users and to fix things. Even so, 20 years is a very long time for a software company. And especially the one that has created VNC technology. It’s a great moment and I’ve enjoyed reading about 20 years of RealVNC.”

Meeting RealVNC at Infosecurity Europe 2022

“We were present at Infosecurity Europe 2022, checking out some of the security products on offer. It was a bit surprising to run into RealVNC at the event, as I never thought of them as a security company.

However, after listening to one of their talks, their presence has started making a lot of sense to me. RealVNC’s presence at Infosecurity Europe 2022 was showcasing its security-centric approach. RealVNC was truly challenging the industry to put its money where its mouth was when it came to security.

This was done, among other things, by showing the results of a comprehensive white-box audit by Cure 53. We were happy to see that our data is in safe hands when we’re using their remote access solution. It would also be nice for other companies to prove that they are secure with something other than words.”

VNC Server for Mobile – supporting the mobile workforce

“As employees become more mobile, we find that our mobile device fleet is also growing. The problem is that a lot of tasks that needed a computer in the past are now performed via an app. And if there’s an app, there will be a user who needs some support with it. 

Therefore, we were very happy when we found out about the release of VNC Server for Mobile. Whenever a user calls with an issue related to their smartphone, our support guys can connect and see their screen. They can then quickly tell them what to do and get them back to work in no time. And the app is quite easy to use, too!”

Screen blanking, to keep data away from prying eyes 

“A lot of the data that our employees deal with is confidential. However, our IT support department still needs to do work on those machines, update them or install software. 

This is why we welcomed the VNC Connect update that added improved screen blanking.

The URI handler is also very helpful. Sessions can now be launched from other software, such as a web browser. That saves time that we would use to instruct users. That time can now be spent supporting them.”

API Access – data that’s easier to manage

“We’ve requested this, so we were happy to see API Access implemented in VNC Connect. Like any large company, we have an ever-changing fleet of devices. This makes tasks like managing licenses difficult. 

We can now have a better overview of our devices and we can also manage them more efficiently.”

Device management with RPort

“We use remote access daily to perform various tasks on our fleet of devices. However, these tasks sometimes seem to get quite repetitive and, most of all, time-consuming. 

This is why RPort being acquired by RealVNC sounds very promising to us. The idea of managing devices quickly and easily, and only remoting into them when you need to perform a specific task, sounds great. 

We’re excited to see what happens to the product in the future and how it will integrate with VNC Connect. Just as excited as we are to see what VNC Connect updates will include in 2023.“

Season’s greetings and a happy 2023! 

Whether you’re looking at things from a customer’s perspective or our “inside RealVNC” one, 2022 was a great year for us at RealVNC. But we promise that 2023 will be even better! 

In the meantime, from all of us at RealVNC, season’s greetings and a fantastic 2023!

The post How RealVNC customers experienced 2022 and what’s next appeared first on RealVNC®.

]]>
Make more of VNC Connect: Introducing API Access https://www.realvnc.com/en/blog/make-more-vnc-connect-introducing-api-access/ Tue, 22 Nov 2022 14:39:01 +0000 https://www.realvnc.com/?post_type=blog&p=13875 API Access for VNC® Connect allows you to automate device management at scale, helping to increase efficiencies across your organization.

The post Make more of VNC Connect: Introducing API Access appeared first on RealVNC®.

]]>

Every company is unique in the way that they work. With the release of API Access, you can now build custom programs that integrate VNC Connect with your company’s tools, processes, and data.

That means, for example, that you can create a real-time overview of your licensed devices within your IT Service Management (ITSM) tool, maximizing the value of your IT assets and your VNC Connect subscription.

Automate device management

When you have thousands of devices to manage across an entire organization, it is both time and resource intensive. Fortunately, API Access changes all that. Now you can automate what were traditionally manual tasks that required hours of an IT Manager’s time, reducing them to just minutes, or even seconds, worth of work.

For instance, API Access lets you build scripts to identify all duplicate devices and remove them from your VNC Connect account. Or, at the click of a button, you can bulk add new devices to groups or rename multiple devices in one go, freeing you and your team to focus on more important work.

Improve oversight of managed devices

A centralized view of device management allows your team to work more effectively.

You can make multi-tasking easy by removing the need to use VNC Connect’s Portal and reducing the number of places your teams need to log in to for device management.

Leveraging VNC Connect data

Data delivers the most value when it’s not sitting in a silo. With API Access, your VNC Connect data is now readily available to bring into other solutions and blend with other datasets. Not only does that give you a real-time view of your VNC Connect usage, but it also opens up a world of potential to uncover new usage insights and identify opportunities for optimizing your IT assets.

Further documentation on API Access

To explore API Access for VNC Connect, here is some more in-depth information:

The post Make more of VNC Connect: Introducing API Access appeared first on RealVNC®.

]]>