{"id":42603,"date":"2021-11-15T15:47:35","date_gmt":"2021-11-15T15:47:35","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=ebc0412945d0687c39e7488b65b5a261"},"modified":"2021-11-15T15:47:35","modified_gmt":"2021-11-15T15:47:35","slug":"what-should-you-really-be-asking-about-your-remote-access-software","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/what-should-you-really-be-asking-about-your-remote-access-software\/","title":{"rendered":"What should you really be asking about your remote access software?"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/cloud-pro\">Cloud Pro<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">17 Nov, 2021<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p dir=\"ltr\"><span>Of all the tools underpinning modern IT management, VNC may be one of the most prolific. First developed in the mid-1990s by RealVNC, it\u2019s spent the past three decades enabling IT teams to access remote systems throughout their estate, and has found its way into the toolbelt of every support technician.<\/span><\/p>\n<p dir=\"ltr\"><span>It may seem like a simple tool \u2013 and in many ways, it is. The underlying RFB protocol that powers VNC-based remote access tools hasn\u2019t changed all that much since it was first introduced, and although its open-source origins have resulted in a huge number of different VNC solutions, they all share most of the same core capabilities.\u00a0<\/span><\/p>\n<p dir=\"ltr\"><span>This can lead many organisations to treat remote access software as \u201dpart of the furniture\u201d; something that\u2019s useful to have around, but not worth giving any particular thought or consideration to. Indeed, when selecting a VNC solution, many IT professionals simply gravitate towards the first option that comes to mind.<\/span><\/p>\n<p dir=\"ltr\"><span>However, while remote access software may not necessarily be a transformative part of your IT stack, selecting a provider should be given a significant amount of scrutiny. Not only is it a foundational part of many operational tasks, making the wrong choice can have serious potential consequences further down the line, and there are a number of important questions that any IT department should be asking of their potential partners.<\/span><\/p>\n<p dir=\"ltr\"><span>For instance, certain options may present unforeseen logistical challenges, like platform compatibility. Just because your chosen flavour of remote access software allows technicians to access Windows desktops doesn\u2019t necessarily mean it\u2019s going to play nicely with every operating system, and that could be a problem if you also need to access Linux-based servers. Some providers will even support connections from mobile devices, giving technicians remote access even while on the go.<\/span><\/p>\n<p dir=\"ltr\"><span>Deployment is also something that bears consideration. If you\u2019re managing a large fleet of devices, you\u2019ll need a remote access provider that supports automated remote configuration and deployment. If not, support staff will be faced with the tedious prospect of manually installing agents on every machine, one by one. Alternatively, you may want to opt for a provider that offers agentless, on-demand connections to reduce on-device footprints.<\/span><\/p>\n<p dir=\"ltr\"><span>Connectivity, meanwhile, is frequently one of the most frustrating elements of IT support, particularly with remote access software that involves laboriously configuring firewalls and port access rules to permit connections. Modern enterprise-level vendors like RealVNC, by contrast, offer cloud-based connection brokering that bypasses fiddly firewall customisation, as well as direct peer-to-peer connections for high-security, privacy-conscious or offline environments.<\/span><\/p>\n<p dir=\"ltr\"><span>You should look at performance, too. While the fundamental technology underpinning VNC may not have changed all that much in the last 30 years, it isn\u2019t always implemented as efficiently as it could be, so pay attention to any performance guarantees offered by vendors in order to ensure that your remote sessions are as seamless as possible.\u00a0<\/span><\/p>\n<p dir=\"ltr\"><span>The biggest area of focus, however, should be security. The purpose of remote access software is to give IT teams an easy way to interact with systems from wherever they are, including back-end servers as well as employee desktops and laptops. By definition, then, this software will likely be installed on most \u2013 if not all \u2013 of a company\u2019s machines.\u00a0<\/span><\/p>\n<p dir=\"ltr\"><span>While this is convenient for providing support to colleagues, it can be a double-edged sword under the wrong circumstances. If your technicians can access every computer in your estate from anywhere in the world, it also means that if an intruder gains access to your systems, then they can too. Think of it like giving your neighbour a spare key to your house; it can come in handy for a great many things, but you have to be absolutely certain that you trust them to keep it safe.<\/span><\/p>\n<p dir=\"ltr\"><span>This isn\u2019t just about making sure that potential suppliers provide robust privilege management and account authentication options \u2013 although these are essential for preventing account takeovers and exploitation by insider threats. It\u2019s also about making sure you trust the security of the software itself.<\/span><\/p>\n<p dir=\"ltr\"><span>Open source technology has a reasonably good record for security, but instances like the Heartbleed OpenSSL bug prove that it\u2019s not immune from being compromised. Commercial vendors, on the other hand, can take the foundation created by open source protocols and layer additional protections on top of it, as well as proactively monitoring for potential bugs and vulnerabilities before they become an issue.<\/span><\/p>\n<p dir=\"ltr\"><span>Of course, that\u2019s not to say that vendors should be implicitly trusted. Over the last several years, we\u2019ve seen a number of high-profile supply chain attacks on vendors like Kaseya, Solarwinds and more, which have allowed hackers to smuggle malware into customers\u2019 environments. It\u2019s therefore prudent to treat all vendors with a healthy dose of scepticism and to make sure that you\u2019re comfortable with the level of security they offer, as well as the data they\u2019re collecting and storing from your activity.<\/span><\/p>\n<p dir=\"ltr\"><span>RealVNC\u2019s offering, VNC Connect, has been built from the ground up for business deployments, specifically tailored to meet these needs. It offers a wide range of automated deployment options, integration with existing enterprise tools, comprehensive platform support and a battery of security protection, including 256-bit AES encryption, multi-factor authentication and granular permissions controls.<\/span><\/p>\n<p dir=\"ltr\"><span>It\u2019s also built by the original authors of the RFB protocol, so it\u2019s optimised for performance with patented technology to help keep connections stable even when faced with low bandwidth. It also includes printing, chat and file transfer functionality, and a robust management console.<\/span><\/p>\n<p dir=\"ltr\"><span>Remote access software may not be the newest technology in the world of IT, and it\u2019s certainly not the sexiest \u2013 but that doesn\u2019t make it any less important. It\u2019s one of the most versatile and widely-used IT tools in the world, and it deserves to be chosen with an appropriate level of care. You wouldn\u2019t leave the keys to your house under the doormat \u2013 so don\u2019t do the same with the keys to your IT estate.<\/span><\/p>\n<p dir=\"ltr\"><em><strong><a href=\"https:\/\/www.realvnc.com\/en\/\"  rel=\"nofollow\">Learn more about RealVNC&#8217;s services<\/a><\/strong><\/em><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Cloud Pro<\/p>\n<p>        17 Nov, 2021    <\/p>\n<p>      Of all the tools underpinning modern IT management, VNC may be one of the most prolific. First developed in the mid-1990s by RealVNC, it\u2019s spent the past three decades enabling IT teams to access r&#8230;<\/p>\n","protected":false},"author":404,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-42603","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/404"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=42603"}],"version-history":[{"count":2,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42603\/revisions"}],"predecessor-version":[{"id":42605,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/42603\/revisions\/42605"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=42603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=42603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=42603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}