islonline

REMOTE ACCESS

Remote access and online collaboration solutions, enabling businesses and organizations to control devices, share screens, collaborate in real time, and conduct virtual meetings securely and efficiently.

Request a demo! Write to us and we'll get in touch!

ISL Online

Sign up to receive our newsletter

TWO-FACTOR AUTHENTICATION

SESSION CODE

STRONGER ENCRYPTION

TRANSPARENT TO FIREWALLS

NEXT-GENERATION REMOTE DESKTOP SECURITY FOR YOUR BUSINESS

ISL Online, since 2003, specializes in remote access technology for IT professionals in over 100 countries. Our solution enables remote control of Windows, Mac, Linux, and mobile devices, available in the cloud and on-premises. ISL Online is part of the XLAB Group, headquartered in Slovenia with offices in Switzerland, the UK, and the US.

Request your demo

ADVANCED PROTECTION

At ISL Online, we prioritize information security when establishing connections with remote computers. We implement robust measures to meet the high security standards our customers demand. We use 2048/4096-bit RSA encryption for public-private key exchange, followed by 256-bit AES encryption to protect data traffic. In addition, we employ unique session codes that are automatically invalidated after each connection, and we offer two-factor authentication to add an extra layer of protection. ISL Online is also compatible with existing firewalls, initiating outbound connections through standard ports such as 7615, 80, or 443, without requiring any additional configuration.

Information Security

At ISL Online, security is paramount. We implement multiple layers of protection to secure remote connections:


  • Strong Encryption: We use 2048/4096-bit RSA and 256-bit AES to encrypt data.
  • Unique Session Code: Each session uses a unique code that is invalidated after the connection.
  • Two-Factor Authentication (2FA): We add an extra layer of security.
  • Firewall Compatibility: Works with existing firewalls without additional configuration.
  • Secure SSL Connection: We use SSL with RSA and Diffie-Hellman to secure data transmissions.


Additional Security Measures

 

  • ISO 27001:2013 Certification: We comply with international safety standards.
  • Port Filtering: Port management for secure access.
  • Whitelist/Blacklist: IP/MAC-based access control.
  • Code Signing: Ensures the authenticity and non-modification of the software.
  • Security Audits: We conduct regular penetration tests to identify vulnerabilities.
  • Brute Force Attack Protection: We limit failed login attempts.