Remote Control Software

Remote Control Software

The computer remote control software used by XIRGO is used by millions of users around the world for giving spontaneous support over the Internet or for accessing unattended computers (e.g. remote support for servers). Depending on the configuration of the software, this means that the remote computer can be controlled as if you were sitting right in front of it. The user who is physically logged on to the remote computer, will also be granted administrator rights - giving him/her the ability to control the computer at anytime while the XIRGO operator takes charge.
Encrypted Connections

Encrypted Connections

All internal communications at XIRGO are encrypted - meaning that conversations between XIRGO employees are nearly impossible to breach. Furthermore, the connection between XIRGO remote support operators & your business's network / computers is safely encrypted. Our remote connection software is based on RSA private-/public key exchange and AES (256 Bit) session encoding. This technology is based on the same standards as https/SSL and is considered completely safe by today's standards.
No Stealth Mode

No Stealth Mode

It is impossible for XIRGO to invisibly control a computer in your network. For data protection reasons the person sitting on the remote computer can always detect when XIRGO is accessing the machine. This gives your business the piece of mind that XIRGO cannot spy on your business's actions.
Valid Computer ID

Validation of Computer ID's

The computer remote connection ID's are automatically generated by our remote control software itself, based on hardware characteristics. The software's servers check the validity of the ID before every connection so that is not possible to generate and use fake ID's.
Brute Force Attacks

Protection from Brute Force Attacks

In the context of computer security, brute force attacks are often attempts to guess a password which is protecting a protected resource by trial and error. With the growing computing power of standard computers the time needed for guessing even longer password has been increasingly reduced. As a defence against brute force attacks, our remote control software exponentially increases the latency between the connection attempts. For 24 attempts it takes 17 hours. The latency is only reset after successfully entering the correct password.
Code Signing

Code Signing

As an additional security feature, XIRGO remote control software is signed via VeriSign Code Signing. The publisher of the software can always be reliably identified. Has the software been changed afterwards, the digital signature becomes automatically invalid.
Datacenter

Datacenter & Backbone

The central remote control software servers are located in a highly modern data centre with multi-redundant carrier connection and redundant power supply. Exclusively brand-name hardware (Cisco, Foundry, Juniper) is being used. The access to the data centre is only possible after a thorough identity check through a single entrance gate. CCTV, incursion detection, 24/7 surveillance and on-site security personnel protect the servers against attacks from within.
Confidentiality Agreement

Confidentiality Agreements

XIRGO signs confidentiality agreements with each customer prior to any servicing tasks. Furthermore, all XIRGO staff members sign non-disclosure agreements, protecting your business against any possible thefts of password & sensitive information.