

However, to maintain FIPS compliance, users must restrict usage of server-side algorithms to FIPS 140-2 Annex A security functions. This is because, as a comprehensive and versatile remote connection solution, we must also continue supporting unsecure connections (e.g., Telnet). Using entries that do not natively support FIPS-only approved security functions will still be available by design. Remote Desktop Manager will automatically switch to FIPS-enabled mode on operating systems running Windows with enforced FIPS-only algorithms configuration, and if the authentication mode for Remote Desktop Manager is Application Password. To ensure that Remote Desktop Manager complies with restrictions in these environments, we have aligned it with the standard’s approved security functions for encryption at rest and in transit. The Annex A “ Approved Security Functions for FIPS PUB 140-2” defines the list of approved security functions that are considered secure for highly sensitive environments.

Our experts rely on tested methods and help organizations in Asia find the answers they need to optimize their cybersecurity posture. Best Practices Consulting Our customer success stories prove the successful application of our methods and tools.Our experienced support team responds promptly to queries, deliver scheduled health checks so you gain maximum benefits from our solutions.

After-Sales Services Our relationship with you does not end when we close a sale.We accelerate Time-To-Value by delivering high-quality implementations to meet customer priorities and processes. Implementation Services We know that your satisfaction is dependent on both the right software and a fast and successful implementation.Training Services Certified Training courses delivered by our trained and experienced specialists that enable your team to learn the skills, tools, and processes needed to become productive, implement best practices and achieve high quality standards.

