Full-Process Secure Remote Control Assurance

From the inside out, we leave no opportunity for any threats.

When You Grant Remote Control Access

Protect the information security of the controlled user throughout the whole process, so you can safely accept remote assistance from others.

01Before · Prevent potential risks
  • Dual authentication

    Your consent is required for every remote access, ensuring that only trusted individuals can control your device.

  • Anti-Harassment Settings

    Configurable blacklist of IP addresses and MAC addresses. Prevent strangers from harassing you remotely.

  • Reject unfamiliar remote control

    If you receive an unfamiliar remote control request, you can directly block the account to prevent further access.

02During · Perceivable security
  • Alert you when your device is being controlled

    Get timely alerts via the AweSun client whenever someone accesses your device. End any suspicious session with a single click.

  • Suspicious Program Protection

    When sensitive applications (e.g., financial software) are running, you'll receive timely alerts and can interrupt remote sessions to safeguard your data.

  • Full Control on the Controlled Side

    Selectively disable mouse input and file transfer to prevent unauthorized operations or data leaks.

03After · Traceability of remote control
  • Multi-channel Viewing of Controlled Records

    View all the controlled records on PC and mobile, and report suspicious activities.

  • Block Suspicious Remote Control

    Easily block unfamiliar or suspicious accounts and devices to stop unwanted remote control requests.

When Remotely Accessing Your Own Devices

Remotely control your device with confidence, ensuring that the controlled device does not become a "security gap".

01

Pre-event Prevention

Device login verification

Alert you when your account is logged in on a new device or from a different location.

Dual password protection

Pair with account password verification and controlled device's local password verification. Dual verification protects your data from leakage.

02

Guarding During Remote Control

Privacy screen

The controlled device shows a black screen during the remote control to prevents the accidental disclosure of private information on the computer.

Automatic client lock

Prevent others from viewing and modifying your AweSun settings

03

Traceability After Remote Control

Automatically lock the screen after remote control

Automatically lock the local computer screen after the session ends, further enhancing the information security of remote work.

One Solution, Full Protection — Tailored to Business Demands

01

Pre-event Prevention

Refined role permissions

Admins can assign different permissions to different members to ensure secure operations

Multi-factor security protection

Support multi-factor security protection, login behavior auditing, and device remote control authorization to ensure the credibility of identities and environments.

02

Guarding During Remote Control

Watermark strategy

Prevent company data leakage via screenshots, screen recordings, and other means during remote control of office devices.

Customizable software permissions

Set permissions such as disabling remote file transfer to prevent important files from being copied or leaked externally.

03

Traceability After Remote Control

Security audit

Detailed remote control logs ensure the traceability of any remote events.

Hardware Change Record

Comprehensively record the information and changes of enterprise hardware assets to prevent employees from privately replacing components which might results in the loss of enterprise assets.

Comprehensive Protection. Secure and Reliable

Strict adherence to privacy standards, ensuring risk-free remote security.

  • Encryption Algorithm

    Adopt RSA-2048 asymmetric cryptographic algorithm, based on the AES encryption of the P2P data transmission protocol

  • International Certification

    Certified with ISO 9001 and ISO 27001 international certifications

AweSun: Ensuring Remote Security for UsersDownload Now