Hi,
We are storing a very limited amount of information about your monitored systems (Name, OS version, IP Address and Mac Address) on our servers, any other system info including files and data that you get to see on your monitored devices are sent by the agent to our cloud servers and temporarily stored in an encrypted block of memory for a few seconds, sent to the mobile device itself and then deleted.
We use RSA Key Exchange mechanism with a 2046 bit encryption for packet transport providing you with the maximum security there is. Our servers are located in a secure datacenter and we have a high security policy restricting access to only authorised staff; not even our staff can access your account system details, only the account registration information. Also, the account details are encrypted and the password is salted.
The solution provides you with several protection mechanisms:
- Two-step authentication;
- Device command authorisation for each system - allowing you to limit the mobile devices that can send commands to that monitored system;
- Device access policies - allowing you to globally restrict each device access to the systems including default policies;
- Notifications for each device added to the account.
Finally, every command that is being executed on a monitored system (including file browsing commands) is being logged in the Application Event Log on that system.
Hope this helps.