We are considering GetOverX Shield for several company PCs. I see a “Remote Access” option under Tools. How does this work and is it secure enough to use in a corporate setting?
(12-05-2025, 01:40 AM)MateoCollins Wrote: We are considering GetOverX Shield for several company PCs. I see a “Remote Access” option under Tools. How does this work and is it secure enough to use in a corporate setting?
The remote access that Getoverx X brings is super simple you can support whoever you want wherever you want is P2P very useful, you just have to have Getoverx Shield installed, Freedom!!
Hi!
The Remote Access feature is designed to help administrators connect to and manage endpoints that are running GetOverX Shield. Conceptually, it integrates with your existing remote access tools and central management approach.
In a corporate environment you would typically:
Configure Corporate Settings (server, port, token) in the Configuration section so that each endpoint knows how to reach your management server.
Use Remote Access in combination with your corporate policies (VPN, jump servers, etc.) to ensure connections are authenticated and encrypted.
Security-wise:
Make sure access to the management console is restricted to authorized admins only.
Protect credentials and tokens securely.
Combine Remote Access with proper network segmentation and firewall policies.
When configured correctly, it is a powerful and safe way to manage multiple devices from a central place.
(12-05-2025, 02:08 AM)mrwebfeeder Wrote: Hi!
The Remote Access feature is designed to help administrators connect to and manage endpoints that are running GetOverX Shield. Conceptually, it integrates with your existing remote access tools and central management approach.
In a corporate environment you would typically:
Configure Corporate Settings (server, port, token) in the Configuration section so that each endpoint knows how to reach your management server.
Use Remote Access in combination with your corporate policies (VPN, jump servers, etc.) to ensure connections are authenticated and encrypted.
Security-wise:
Make sure access to the management console is restricted to authorized admins only.
Protect credentials and tokens securely.
Combine Remote Access with proper network segmentation and firewall policies.
When configured correctly, it is a powerful and safe way to manage multiple devices from a central place.
ya no viene en la version Core, tampoco en la version PRO. Como hago para adquirir el Get Over X remote. Gracias