Crocoblock

Product details
BMCBMC
BMCPLUS
Jun 16, 2021

Q: hi, thanks for your offer!

with all the references by other to teamviewer i'm assuming in addition to link for support that unattended remote access is also an option. with that in mind just some quick questions...

1. are data centers ISO and SOC 2 certified?
2. are software sessions encryption for data in transit? if yes, what encryption is private/public key exchange and session encryption based on?
3. do you offer two-factor authentication as an optional second layer?
4. do your key exchange provide full client-to-client data protection so your routing servers are not able to read the data stream?
5. what code signing technology are program files are secured with?
6. i understand access is via link and there are no passwords so what provides security against unauthorized access to a remote system?
7. do security functions like file transfer require manual confirmation from the remote partner?
8. is invisible control allowed or user has to be able to detect when someone is accessing pc?
9. is there any option for setting configuring to require trusted device before signing in? 10. does system monitor for unusual behavior (e.g. access from new location) that might suggest system compromised? if yes, how is this address without passwords being required?

Share
Helpful?
Log in to join the conversation

Hello, thanks for the great questions.

1. Our hosts where our servers are running have DIN ISO/IEC 27001 certification https://www.hetzner.com/pdf/en/FOX_Certificate.pdf

2. We use AES 128 encryption for session keys and RSA 2048 for key exchange

3. Yes, we now have two-factor authentication via email and Telegram. We plan to add support for Google Authenticator in the next few days

4. Yes, we use a WebRTC that encrypts data clent-to-client and allows to make a p2p connection

5. Files are signed with Extended Validation Code Signing certificate

6. We have three types of access:

- By a quick one-time link. The link is destroyed immediately after the first connection. There are also algorithms on the server that protect against brute-force. Used for quick connection

- By permanent link. Access requires a password or special rights allocated by the computer owner. Used for permanent access

- By invitation. User gives access by running a special file. Used for professional support

7. No confirmation is required at this time. File transfer notifications pop up on the remote computer. In the future, we plan to add settings to allow confirmation

8. There is no invisible access function at the moment

9. Not at the moment, we plan to add these settings in the future

10. Not at the moment, we plan to add these settings in the future

BMCPLUS

hi Farid,
thanks for the quick response and all the good info! another question...is there a way to switch between multiple monitors on a remote pc?