Full process security remote control guarantee
From inside out, do not allow any threats to take advantage of
When you accept remote control
Protect the information security of the controlled user throughout the entire process and accept remote assistance from others with peace of mind
Dual authentication
Requires your consent for every remote access. Ensure only people you trust can control your device.
Anti-Harassment Settings
Configurable blacklist of IP addresses and MAC addresses. Prevent strangers from harassing you remotely.
Reject unfamiliar remote control
If you receive an unfamiliar remote control, you can directly blackout the account to prevent the other party from controlling you again.
Alert you when your device is being controlled
When your device is controlled, you can receive timely notification on your AweSun client and other channels. You can also interrupted any suspicious remote control immediately.
Suspicious Program Protection
When your computer executes sensitive programs (e.g. financial software), you can receive timely notification and interrupt remote control, preventing data leakage.
Strong dominant position of the host side.
Prohibit mouse operation and file transfer, preventing the control side from performing sensitive operations on your computer.
Multi-channel viewing of controlled records
You can view all the controlled records on PC and app, report suspicious remote control, and create a good remote control environment with AweSun.
Blacklist suspicious remote control
You can Blacklist unfamiliar or suspicious accounts to no longer receive their remote requests, to prevent unnecessary harassment.
When you remotely control your own equipment
Rest assured to remotely control devices that are not around, ensuring that the controlled device does not become a 'safety exposure'
Pre prevention measures
Device login verification
When your account logs in from a new device or another location, it will provide an alert prompt to ensure a trustworthy environment and user experience
Double password protection
Account password+controlled terminal local password verification, double verification to protect your data from leakage
Guarding during the event
Privacy screen
During remote control, the controlled device displays a black screen to prevent unauthorized access to private information on the computer
Automatically lock the client
Prevent others from viewing and modifying your software settings
Follow up afterwards
Automatically lock the screen after being charged
Automatically lock the local computer screen after being charged, further enhancing the information security of remote work
Tailored to the different needs of various enterprises, comprehensive security solutions
Pre prevention measures
Refine role permissions
Provide flexible access control and permission management, where administrators can assign different permissions to different members to ensure secure operations
Multi factor security protection
Support multi factor security protection, login behavior auditing, and device remote control authorization to ensure trustworthy identity and environment
Guarding during the event
Watermark strategy
Prevent the leakage of company data through methods such as screenshot and recording when remotely controlling office equipment
Software customization permission customization
Remote file transfer permissions can be set to prevent important file information from being copied and transmitted, and from being leaked to the outside world
Follow up afterwards
Audit
Detailed remote control logs are recorded, and the entire operation and maintenance process is recorded to ensure the traceability of events
Hardware Change Record
Comprehensively record enterprise hardware asset information and change records to prevent employees from replacing parts without authorization, which may lead to the loss of enterprise assets
Thorough protection, safe and reliable
Strictly adhere to privacy standards, ensure security and compliance without risks
Encryption algorithm
Adopting international 2048 bit RSA asymmetric key exchange and AES encryption mechanism for autonomous P2P data transmission protocol
International certification
Meet ISO9001 quality management system certification and ISO27001 information security management system certification