Secure Remote Support

Build Your Relationships on Trust with Robust Security

Businesses expect anyone working on their IT - whether inside an organization or via an IT service provider - to keep their data and information secure. SolarWinds® Take Control is built from the ground up with security in mind to help you earn your customers' trust with one of their most important assets—their data. From robust encryption to two-factor authentication to automatic clipboard deletions after sessions, Take Control is designed to provide the secure remote support you need to help keep your customers' data safe.

Padlock on laptop

Take Control is built to:

  • Increase customer trust through safer data management
  • Provide peace of mind with two-factor authentication and multilevel permissions
  • Protect intellectual property by automatically removing information from clipboards

Key features

Take control is designed to provide:

  • Developed with software development life cycle, including data privacy by design and default principles, to help support GDPR readiness and HIPAA compliance
  • Security that meets the FIPS (140-2) cryptographic standards using FIPS compliant open SSL cryptographic modules to help keep sessions safe from prying eyes
  • Elliptic Curve Diffie-Hellman (ECDH) key agreement scheme to enable secure shared secrets between two endpoints, even before the session is established, to help keep sessions secure
  • The ability to designate which IP addresses can access Take Control to help ensure only authenticated users have access your client resources
  • Advanced Encryption Standards (AES) 265 data encryption to help keep data secure both in transit and at rest
  • Multi-layer authentication via technician access permission settings and two-factor authentication (2FA), which requires both a username/password combination in addition to a tokenized TOTP protocol implementation to help keep accounts secure
  • Safeguarded session creation to help ensure sessions can be initiated only by technicians with appropriate permissions
  • The option to lock the machines after each session to help both technicians and customers rest assured the machine won’t be accessible to the wrong people
  • Idle sessions timeout control to help prevent hackers from stealing a session
  • Automatic clipboard deletions after sessions to help ensure sensitive data, like user credentials, don’t get stored after they’re needed
  • Prevention of auto-sleep, auto-lock, and inactivity disconnects