Cloud-enabled remote access software
How it works
Cloud-enabled remote access software allows you to control a single computer at the office with a remote computer. To set this up, you need to download remote desktop software to the computer you need remote access to, and to use remote access software or a web browser on your remote computer.
These apps often don't require any special configuration like 'port-forwarding' which exposes devices or services directly to the internet. This can make them easier to set up.
The provider helps initiate the connections and you will typically need to authenticate to the provider. This means you can avoid some of the risks of exposing an application on the internet, but you will have to trust the provider to help keep you secure.
Products like Chrome Remote Desktop, Team Viewer, AnyDesk and LogMeIn are some examples of cloud-enabled remote access software.
Best for...
Cloud-enabled remote access software is a good option when you have a limited number of staff, third party vendors, or contractors who need access to a single computer.
Not so good for...
These types of remote access typically use quite a bit of internet bandwidth. This might limit you if you have a large number of staff needing remote access at the same time.
If you need quick and responsive applications, some cloud enabled solutions can have delays between taking an action, and seeing any results.
Some use cases might require direct access to your work network such as through a VPN. This is likely not possible when using cloud enabled or direct remote access software.
Important things to note:
- Use strong passwords.
- Use MFA if possible.
- Check if the vendor is reliable and trusted.
- Check if the software is still supported and patched by the vendor.
- Keep up with your updates.
- Configure and review security and access logs.
- Check if the software used supports strong encryption.
- Check if the performance will suit your needs.
The details
Description | Advantages | Disadvantages |
---|---|---|
Authentication | Some software allows multi-factor authentication (MFA) and other secure controls, like login attempt limiting. | Authentication controls have to be configured, and not every desktop software offers the same options. Some software only requires a PIN which can be easy for attackers to guess, brute force, or phish. You must trust the vendor's authentication methods. |
Authorisation | Allows you access to the computer as if you were sitting at your desk. For third parties, vendors or contractors who only need access to one computer, this could be a good solution. | Cloud-enabled remote access software doesn't always have a central point to control who has access, so it can be difficult to control if you have multiple staff using their own remote desktop software. |
Encryption in-transit | Most vendors confirm that they use encryption. This is configured and enforced by the remote desktop software and requires no setup or user involvement. | Most remote desktop software uses proprietary protocols, which means you can't be sure how they work. You also don't have the ability to change these protocols or configurations yourself. |
User accessibility | Depending on the software, it may only require a user to download software or access a website (browser-based) on their remote computer. | Some staff may require help in getting the remote desktop software downloaded and installed on their work computer. |
Initial setup and maintenance | Initial setup is easy. It requires you to download software on your work computer and set up configurations. After that it will require periodic software updates. | Most remote desktop software uses their own proprietary protocols. This means the vendor is solely responsible for keeping it secured. |
Performance | Both cloud-enabled and direct remote access software means you can control a powerful computer remotely from a less powerful one. This allows you to do more intensive work without having to transport the powerful computer. This type of software often streams a video of the screen, passing your keyboard and mouse input through to the office computer. Most of the processing is done on the office computer which means the main restriction in performance is likely your internet connection. | Because remote access software often streams video and passes your keyboard and mouse input through to the office computer, there may be delays between your interactions and seeing the result on screen. If you plan to have many people using remote access software at the same time, your internet connection may not cope. |
Attack surface | You won't be exposing software directly to the internet for attackers to try attack. | You will have to trust the vendor brokering the remote access connection for you. |