Security is the priority!
BeAnywhere technology is being continuously developed for almost a decade.
The proprietary network protocol built in this product is used in thousands of computers
around the world, with millions of sessions made every year.
Since the beginning, security always prevailed over any other feature.
Security Architecture: Overview
Server Computer that is being accessed.
Viewer Computer that is doing the remote access.
1 - All communications between the Server and the Viewer (image transfer, keyboard, mouse, files and clipboard) are encrypted with an RC4 compatible algorithm with a 2048 bit key. This way, the privacy of all information sent and received by the user is assured.
2 - To prevent "man-in-the middle" attacks, all communications containing image, keyboard and mouse commands, files and clipboard have a digital signature that assures the data has not been changed between the sender and the receiver.
3 - Each Server communicates with BeAnywhere Central Server through a secure SSL connection. Each Server logs in the central server through a user/password combination, and this combination is always sent through that same secure connection.
5 - For greater security, you can configure your Server so that at the end of each session the remote computer is locked, forcing the next user to login on the remote computer again. This double login system allows two authentication levels on the Server.