Security.com

remote access

By Linda Rosencrance

What is remote access?

Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a network connection.

Remote access enables users to connect to the systems they need when they are physically far away. This is especially important for employees who work at branch offices, are traveling or telecommute.

Remote access enables remote users to access files and other system resources on any devices or servers that are connected to the network at any time. This increases employee productivity and enables employees to better collaborate with colleagues around the world.

A remote access strategy gives organizations the flexibility to hire the best talent regardless of location, remove silos and promote collaboration between teams, offices and locations.

Technical support professionals can use remote access to connect to users' computers from remote locations to help them resolve issues with their systems or software.

One common method of providing remote access is via a remote access virtual private network (VPN) connection. A VPN creates a safe and encrypted connection over a less secure network, such as the internet. VPN technology was developed to enable remote users and branch offices to securely log into corporate applications and other resources.

How does remote access work?

Remote access is accomplished with a combination of software, hardware and network connectivity.

For example, traditional remote access before the wide availability of internet connectivity was accomplished using terminal emulation software that controlled access over a hardware modem connected to a telephone network.

Today, remote access is more commonly accomplished using:

Remote access VPNs connect individual users to private networks. With a remote access VPN, each user needs a VPN client capable of connecting to the private network's VPN server.

When a user is connected to the network via a VPN client, the software encrypts the traffic before it delivers it over the internet. The VPN server, or gateway, is located at the edge of the targeted network and decrypts the data and sends it to the appropriate host inside the private network.

A computer must have software that enables it to connect and communicate with a system or resource hosted by the organization's remote access service. Once a user's computer is connected to the remote host, it can display a window with the target computer's desktop.

Enterprises can use remote desktops to enable users to connect to their applications and networks remotely. Remote desktops use application software -- sometimes incorporated into the remote host's operating system (OS) -- that enables apps to run remotely on a network server and be displayed locally at the same time.

Users can securely access on-premises and cloud applications and servers from anywhere, on any device with a variety of authentication methods, including remote single sign-on, which gives users easy and secure access to the apps they need without configuring VPNs or modifying firewall policies.

In addition, organizations can use multifactor authentication to verify a user's identity by combining multiple credentials unique to one person.

What are the types of remote access?

Traditionally, enterprises used Modems and dial-up technologies to allow employees to connect to office networks via telephone networks connected to remote access servers. Devices connected to dial-up networks use analog modems to call assigned telephone numbers to make connections and send or receive messages.

Broadband provides remote users with high-speed connection options to business networks and to the internet. There are several types of broadband, including the following:

What are remote access protocols?

Common remote access and VPN protocols include the following:

28 Sep 2021

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement