<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=578826073428599&amp;ev=PageView&amp;noscript=1">
icon-white

TECHNOLOGY OVERVIEW

Helping remote enterprise teams to monitor, manage, and protect their distributed users.

  
Chapter I

Key Components

Remote Monitoring and Management software provides visibility and tools tailored for management of remote end points. Remotely is designed for the way modern enterprise organizations operate.

Remote Monitoring & Management (RMM)

  • Visibility
  • Reporting
  • Interaction
  • Support

Security

Enables visibility to security posture and potential vulnerabilities of remote users

  • Visibility
  • Reporting
  • Policy Management
  • Quarantining

Azure Integration

Integration with Azure stack including visibility to key O365 metrics

  • Visibility
  • Reporting
  • Utilization
  • Savings

Sign up to become an Early Adopter.

Get early access to our Remotely and kick the tires a bit on our new RMM tools.

  
Chapter II

Remote Monitoring & Management Tools

Visibility and tools tailored for management of remote end points.

Support

Interaction with the end user experiencing the problem is often the difference between good service and great service.

Interaction & Support

Dashboard is the central hub for the Remotely solution. The remote administration toolset will assist admins in providing support to end users when experiencing situations

Targeted tools for Administrators

Remote PowerShell

Ability to securely run PowerShell commands and scripts on remote endpoints for users

Integration with existing enterprise tools 

Remotely RMM with focus on helping enterprises leverage their existing technology investments in new ways to meet the changing needs of security and support

Targeted integration platforms

  • Microsoft Teams
  • Zoom
  • ServiceNow

Visibility & Reporting

The Remotely RMM Dashboard is the central hub for the Remotely solution. The data collected from our endpoint agent is displayed for use by the administrators within an organization, each component is broken down into various granularity levels from overall enterprise to individual device.

Measurements collected include

CPU performance

  • Utilization
  • Queue length
  • Interrupt time

Memory performance

  • Utilization
  • Faults
  • Page file utilization

Disk performance

  • Read/Write performance
  • Queue length
  • Free space

Network performance

  • Transmit rate
  • Receive rate
  • Packet errors

Network configuration details

  • Connection Type
  • Signal strength
  • Connection Security

Environmental variables

  • Connected device
  • Enabled protocols
  • Policies
  
Chapter III

RMM – Architecture Overview

Roles Based Access

Roles based access controls are enabled within the application to limit visibility of data and refine focus to relevant information for user roles.

Application Admin

Application Admins are Remotely employees who have access to view, update, and configure account settings only. No endpoint data or configuration is accessible.

Enterprise Admin

Enterprise admins are client administrators that have access at the overall company level, all data is visible to administrators at this level.

Organization Admin

Organization admins are client administrators that have access to specific organizations within a company, only data within the defined org is visible to administrators at this level.

 

Tech-Architecture

Microservices

The application architecture is designed with security as a core tenant, by utilizing segmented microservices we enable faster iteration releases, reduce potential attack impact and reduce our attack surface by only exposing API connectors.

Identity Microservice

Application authentication will be conducted through the identity microservice, entirely segmented from any application information

Admin Microservice 

The admin microservice will host key functions for application administration, entirely segmented for any collected information

Security Assessment Microservice

Data collected from Azure tenant for security configuration is stored and processed within this microservice then displayed via API to admins

Monitoring & Management Microservice

Client data collected from endpoints is stored and processed within this microservice then displayed via API to admins

Microservices
  
Chapter IV

Security

A security posture focused solution to supporting edge devices

Visibility

The Remotely Secure Dashboard provides real time visibility to the security posture of an end users device and environment.

Reporting

The security reporting dashboard gives insight into past security postures and changes over time, at various levels in a single view.

Policy Management

Understanding the security policies that should be applied to a remote device is critical to understanding the user experience.

Quarantining

(Coming soon) Adaptive policy management based on environmental and observed end point risk factors.

Device SRI

Adaptive Policy Management

Utilizing the power of Azure cloud, Microsoft Endpoint Manager, and the information collected by Remotely adaptive security policies can be applied to edge devices based upon their potential risk.

Know Your Edge

Being able to make and automate informed policy actions based upon the operating environment for an edge device will be a key feature of Remotely enabled adaptive risk management practices.

Measurements Collected

  • Anti Virus State
  • Anti Malware State
  • Operating System State
  • Installed Software
  • Network Connectivity
  • Environmental Variables
  • Attached Devices
Device RMM
  
Chapter V

Security Threat Score

A security posture focused solution to supporting edge devices.

    
Chapter VI

Online Security Assessment

A security posture focused solution to supporting edge devices.

Working to help bridge the divide between security and support Remotely gives unique insight into the risk posture of devices connecting to enterprise assets and networks allowing administrators to take informed actions.

Online Security Assessment

Gathers information from Azure into one easy to consume dashboard for your current security model with a focus on endpoint configuration and risk.

Data driven planning

Using the data collected by Remotely Online Security Assessment organizations can determine the best path of investment to reduce their risk landscape within their Azure configuration and deployment.

Configurations assessed

    • Microsoft Endpoint Manager Deployment
    • Azure Licensing
    • Microsoft Windows Update Rings
    • Registered Enterprise Applications & Reported Vulnerabilities
Azure_osa
    
Chapter VII

Azure Integration

Remotely is the first Azure native RMM and edge security solution. Enabling increased adoption and better leverage of existing technology platforms & investments reducing the learning curve associated with new software.

Visibility

Remotely taps into the vast data lake underneath Azure to provide a unique view of the user and how to optimize their environment.

Reporting

The Azure reporting dashboard provides a single source for all user information including Azure interactions and system performance.

Utilization

Understanding how end users are leveraging technology is critical for organization to ensure they are empowering users in the right way.

Savings

Understanding how end users are leveraging technology can ensure that the right services are provided to the right users.

Azure OSA

Integration with Azure stack including visibility to key O365 metrics

Geolocation services

Allows geolocation of managed assets and users to ensure that authentications and access are genuine and enable better visibility to the enterprise global distribution.

Enterprise Applications

Provides visibility through a single dashboard to all enterprise managed applications and any potential associated vulnerabilities.

Microsoft Licensing

Gain visibility to licensing within a Microsoft Azure tenant including Managed, Assigned, and consumed to ensure that applications are used or reallocated to reduce cost.

Azure Security

Building a modern application in the Microsoft Azure cloud enables leveraging of the industry Microsoft

industry leading application security framework

Azure Graph API

Utilization of Microsoft Graph API for data interaction significantly reduces the risk exposer by leveraging existing defined Azure security principal roles with the enterprise

Azure Cloud

Workloads within the Azure Cloud are deployed as members a micro-segment security framework providing port and protocol level isolation, traffic flow and monitoring

    
Chapter VIII

Concluding Thoughts

The need for enterprises to control their remote devices is accelerating.

Since even before the pandemic, enterprises with remote and hybrid workforces saw security risks increasing. The #1 most feared risk? Technology issues: cybercrime, IT failure, and data breaches.

The need for enterprises to control their remote devices is accelerating.

Since even before the pandemic, enterprises with remote and hybrid workforces saw security risks increasing. The #1 most feared risk? Technology issues: cybercrime, IT failure, and data breaches.

Enterprises IT teams are struggling to secure remote and hybrid networks.

Today, tech teams report being understaffed and ill-equipped to support and secure remote and hybrid workforces. Moreover, when tech problems arise for remote employees, it can genuinely affect the company’s bottom line.

And this is why Remotely set out to build a holistic platform for hybrid enterprise teams to monitor, manage, and protect their distributed users.

Contributors

Remote Monitoring and Management Software

Tyler Rohrer

Founder & CEO, Remotely

eddie_riddle

Eddie Riddle

Chief Technology Officer, Remotely

Sources:

1) Even the all-powerful Pointing: Almost Unorthographic.
2) Far far away, behind the word mountains: www.vokalia-and-consonantia.com
3) The copy warned: The Little Blind Text

Become an Early Adopter