VNC Connect security whitepaper. Cloud versus direct with VNC Connect

Similar documents
Cloud versus direct with VNC Connect

VNC Connect security whitepaper. VNC Connect. Instant support FAQs

PCI DSS and VNC Connect

PCI DSS and the VNC SDK

CHOOSING A REMOTE ACCESS SOFTWARE SOLUTION

VNC SDK security whitepaper

Technician s guide to instant support

Connect & take control

PATCH MANAGER AUTOMATED PATCHING OF MICROSOFT SERVERS AND 3RD-PARTY APPS

VNC Connect security whitepaper. VNC Connect security whitepaper

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Securing Your Most Sensitive Data

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Secure Industrial Automation Remote Access Connectivity. Using ewon and Talk2M Pro solutions

Why the cloud matters?

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Duration Level Technology Delivery Method Training Credits. System Center Configuration Manager

Streamline IT with Secure Remote Connection and Password Management

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

Administering System Center Configuration Manager

Administering System Center Configuration Manager

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

SEPARATING WORK AND PERSONAL

CommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync

Evolved Backup and Recovery for the Enterprise

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Securely Access Services Over AWS PrivateLink. January 2019

Course A: Administering System Center Configuration Manager

Microsoft Administering System Center Configuration Manager

Phishing is Yesterday s News Get Ready for Pharming

A: Administering System Center Configuration Manager

Verizon Software Defined Perimeter (SDP).

Administering System Center Configuration Manager

Update Windows. Upgrade the organisation. Reshaping ICT, Reshaping Business FUJITSU LIMITED. uk.fujitsu.com

Best Practices in Securing a Multicloud World

Least privilege in the data center

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

SECURE DATA EXCHANGE

Ruckus ZoneDirector 1106 WLAN Controller (up to 6 ZoneFlex Access Points)

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

BlackBerry Mobile Voice System

Next Level Remote Access

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Administering System Center Configuration Manager ( A)

Cloud Security Best Practices

Twilio cloud communications SECURITY

Meraki Z-Series Cloud Managed Teleworker Gateway

IT MANAGEMENT AND THE GDPR: THE VMWARE PERSPECTIVE

FIREWALL BEST PRACTICES TO BLOCK

Administering System Center Configuration Manager

A: Administering System Center Configuration Manager

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Security Statement Revision Date: 23 April 2009

Choosing the Right Solution for Strategic Deployment of Encryption

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Ruckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)

Network Service Description

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

Getting ready for GDPR

HIPrelay Product. The Industry's First Identity-Based Router Product FAQ

Secure File Sharing and Real-Time Mobile Access to Business Data with Citrix ShareFile

Digital Workspace SHOWDOWN

Administering System Center Configuration Manager ( )

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Service Description VMware Workspace ONE

Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds:

VMware AirWatch Android Platform Guide

Achieving Java Application Security With Parasoft Jtest

Deployment of Cisco IP Mobility Solution on Enterprise Class Teleworker Network

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

Instavc White Paper. Future of Enterprise Communication

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

Security Enhancements

Virtual Desktop Infrastructure and Server Based Computing:

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

The Benefits of Wireless Infrastructure Management in the Cloud

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

The Challenge. The Solution. The Modern Approach to Remote Access

EASY TIME & ATTENDANCE POWERED BY THE CLOUD

Simple and Secure Micro-Segmentation for Internet of Things (IoT)

VPN Configuration Guide. Cisco ASA 5500 Series

SolarWinds Orion Platform Scalability

Freudenberg IT. Steelhead appliances. dramatically accelerated SAP performance for our clients. Solution: Wide-area Data Services

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Administering System Center Configuration Manager

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS)

whitepaper: Whitelisting Without The Complexity

Aerohive and IntelliGO End-to-End Security for devices on your network

CASE STUDY. Customer-at-a-Glance. Industry. Sophos Solutions. Fitas Flax Indústria e Comércio Ltda. Brazil. Manufacturing

Dynamic Network Segmentation

Hosted Exchange 2013

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

Channel Priorities Survey

Transcription:

VNC Connect security whitepaper Cloud versus direct with VNC Connect November 2017

Contents Introduction... 3 Key terminology... 3 Direct connectivity... 4 Cloud connectivity... 5 Summary... 6 Appendix: VNC Connect subscriptions... 6

Introduction VNC Connect is unique among remote access software in its ability to offer both cloud and direct connectivity within a single product. At first glance, knowing whether to connect directly or via our cloud service can seem confusing. However, there are clear benefits to each connection method; the trick is knowing how to maximize these benefits. Note: Direct connectivity is only available if you have an Enterprise subscription for VNC Connect that includes device access. If your subscription is Home or Professional, or only includes instant support, then there is no choice to make, since cloud is the only connectivity mechanism. This brief product guide provides an overview of the differences between cloud and direct connectivity for affected subscribers, and offers advice on how each method can be used to your greatest advantage. Key terminology Throughout this guide, we refer to certain -specific terminology. VNC Connect is comprised of two separate apps: VNC Server and VNC Viewer. For device access, you must install and license VNC Server on the computer you want to control. This is known as your VNC Server computer. You must then install VNC Viewer on the computer or device you want to take control from, which is known as your VNC Viewer device. You do not need to license this device, meaning you can freely connect to your VNC Server computer from as many devices as you wish. 3

Direct connectivity products traditionally supported only direct connections. Direct connectivity has been available for decades and is still used successfully by thousands of organizations. To establish a direct connection between VNC Viewer and VNC Server, you must know the VNC Server computer s current IP address or hostname. If there are routers or firewalls in between, they must be configured to allow connections. An experienced system administrator will not usually find this a problem, but this level of technical knowhow is outside the comfort zone of most users, who may be frustrated by the process. In fact, even a system administrator will be unable to establish a remote connection if they cannot access the VNC Server computer s router (e.g. because their colleague is using hotel Wi-Fi). Despite these drawbacks, a direct connection does offer distinct advantages over a cloud connection. Most importantly, direct connections can be made within a closed network that has no Internet access, such as a LAN. Direct connectivity also provides full control of the route the connection takes, making it ideal for closed networks and security sensitive environments where it is critical to know the exact route of remote access traffic for audit and control purposes. Since no cloud services are involved in a direct connection, there is no risk of performance degradation due to Internet traffic or service interruptions. VNC Connect provides the same level of secure AES end-to-end encryption whether you connect directly or via our cloud service. However, it can be argued that in high security environments, direct connections offer a reduced attack surface because they involve fewer moving parts, all aspects of which are completely under the control of the network administrator. From a management perspective, direct connections are established individually and independently of one another. This makes it difficult to create a common dashboard for the administration of available VNC Server computers, VNC Viewer users and their account information. The result is a more manual management process. Direct connectivity pros: Can operate within closed networks without Internet access. Offers the greatest possible security and performance. Highly configurable for specialized requirements. Direct connectivity cons: Requires significant technical knowledge to configure. Impossible to support connections through routers and firewalls owned by third parties. More complex management, and greater administrative overhead. 4

Cloud connectivity Cloud-based connections are widely used by the remote access software industry and are well established as a reliable and secure method of connectivity. With VNC Connect, our secure cloud service is used to negotiate a connection between VNC Server and VNC Viewer, resulting in the discovery of a peer-to-peer route between each computer. In the rare instance this is not possible, the remote access session itself is relayed by the cloud service. This fallback is designed to ensure a remote access session can always be established and maintained with the best possible performance. The greatest advantage of cloud connectivity is how simple it makes the connection process. There is no need to keep track of IP addresses. Simply select the computer you want to access and provide authentication details, and your connection is up and running. Cloud connections do not require any firewall or router configuration, meaning you can connect to a colleague whose laptop is behind a router you cannot configure, e.g. if they are using hotel Wi-Fi. Cloud connections are ideal for environments where there are no special configuration requirements or advanced security considerations, and you simply want to get on with managing your remote computers or applications. Our cloud service also enables VNC Connect to provide an easy-to-use dashboard where you can maintain and manage access to your device estate. Cloud connectivity pros: Quick to configure, with no special technical knowledge required. Connect to your computers behind firewalls and routers owned by third parties. Device estate can be managed in an easy-to-use dashboard. Cloud connectivity cons: Requires an Internet connection for both endpoints. Cannot be configured for special requirements, e.g. if you need to mandate the route your connections take. Dependent on a cloud service infrastructure. 5

Summary Selecting the most appropriate remote access connection method is not as complicated as it first appears. If you have a conventional network with Internet access and are looking for a simple way to connect to remote computers, cloud connectivity is your best choice. On the other hand, direct connectivity is more appropriate if you are working in a closed network with special configuration or security considerations. The advantage of VNC Connect is that you re not limited to either method. You can choose which option is best for you and even deploy a hybrid, combined environment. A good example would be to use direct connectivity between distributed members of an internal research team - which could be subject to audit controls for regulatory compliance or strict security guidelines - while simultaneously using cloud connections within the IT team to help employees with their computer support needs, no matter where they are in the world. Your choice of connection method is an important consideration. How you connect to your computers defines the fundamental behavior of your remote access environment, and only VNC Connect offers the choice of cloud, direct or hybrid connections within a single product. VNC Connect provides the flexibility you need to Connect & take control. Appendix: VNC Connect subscriptions VNC Connect has three subscriptions: Home, Professional and Enterprise. Home and Professional subscriptions are designed for ease-of-use, so provide only cloud connectivity. Compare our subscriptions. An Enterprise subscription that includes device access is designed for flexibility and control, so additionally supports direct connections. You can connect using either connectivity method depending on your current needs. Note direct connections are not available for instant support, even with an Enterprise subscription. If you have any further questions, please contact us at enquiries@realvnc.com, or visit realvnc.com/connect. 6

s remote access and management software is used by hundreds of millions of people worldwide in every sector of industry, government and education. Our software helps organizations cut costs and improve the quality of supporting remote computers and applications. is the original developer of VNC remote access software and supports an unrivalled mix of desktop and mobile platforms. Using our software SDKs, third-party technology companies also embed remote access technology direct into their products through OEM agreements. Copyright Limited 2016. and VNC are trademarks of Limited and are protected by trademark registrations and/or pending trademark applications in the European Union, United States of America and other jurisdictions. Other trademarks are the property of their respective owners. Protected by UK patents 2481870, 2491657; US patents 8760366, 9137657; EU patent 2652951. www.realvnc.com