Our secure remote access tool was built specifically for point of sale systems processing credit and debit card transactions in a payment environment. Often times business owners make the mistake of installing other common name remote access tools to log you into your computer. Unfortunately those other tools can leave your computer at risk for a data breach if they do not implement two-factor authentication.
Built for Payment Environments
There are best business practices and payment card industry (PCI) compliance regulations to consider when using a remote access tool to remote access a computer processing payment transactions. Our remote access tool has been validated to meet those PCI Compliance requirements.
What is two-factor authentication?
Two-factor authentication requires two of the following three authentication methods:
Something you know, such as a password or pass phrase
Something you have, such as a token device or smart card