1. [AES 256 bit algorithm applied] NQVM is developed with powerful security features applying AES (Advanced Encryption Standard) 256 bit algorithm.
2. [All data encrypted] All data are transmitted after encryption, including screen or file data.3. [File service security] Files are transmitted with approval of the remote (or viewer) computer user. The list all files being transmitted is displayed on the remote (or viewer) computer at the same time they are transmitted.
NQVM Viewer Security
1. [NQVM Desktop access security] NQVM Desktop, tool for remote device integrated management, may be locked manually or automatically (at time set up in advance). The registered remote device cannot be accesses when NQVM Desktop is locked.
2. [Remote access security] It may be set up that remote devices registered on NQVM Desktop may be accessed with user authentication. (In order words, the user ID and password will be required to access remote devices.)
NQVM server security
1. [Setup of remote computer access authority] Authority may be set up for managers or visitors to access a remote computer NQVM server program is installed. A user registered as manager is allowed to use all control or setup functions of a remote computer while a user registered as visitor may only view the remote computer.
2. [NQVM server setup security] User authentication is required to confirm or change NQVM server setup installed on a remote computer.3. [Remote computer access security] The following access security may be set up by a remote user, using NQVM server setup installed on a remote computer.
- [Access only when allowed by user] A viewer computer may access a remote computer after obtaining approval from the remote computer user. The viewer computer user cannot access the remote computer if rejected (by the remote computer user).
- [Remote computer user informed when accessed] When a viewer computer accesses a remote computer, a message window is displayed on the right bottom of the remote computer screen showing the viewer computer has accessed it.
- [Remote computer user not informed when accessed] A viewer computer accesses a remote computer without any message displayed on it. As a minimum security device, NQVM icon on the bottom tray (of the remote computer screen) changes into special icon.
4. [Access log saved] The IP address, accessed time, terminated time and services used by those that have accessed a remote computer are saved in log file format for monitoring access status or information of those who have accessed.
댓글 없음:
댓글 쓰기