Remote desktop

This article describes how NVIS AI secures and future-proofs any remote desktop protocol, while increasing performance.

Introduction

NVIS AI is protocol-agnostic, especially for any type of remote desktop protocol. With many known vulnerabilities and performance issues that remote desktop has, NVIS AI is able to secure and future-proof those solutions.

Problems

1. Public IP addresses exposed

With public IP addresses used for Remote Desktop, organizations are exposed to the following risks:

  • Protocol hacks

  • Port blocking

  • Geolocation/tracking

  • Packet injection

  • Packet sniff/capture

  • Man-in-the-middle (MITM) attacks

  • Distributed Denial of Service (DDoS) attacks

2. Dynamic IP addresses

Business users and hosting services may get static IP addresses. For consumers, many ISPs assign dynamic IP addresses for home routers or broadband users.

Issues with dynamic IP addresses include:

  • Lack of secure remote access

  • No security - the typical user does not want their personal device exposed to the internet and lack technical skills to setup firewalls, port blockers, and/or VPNs to secure them

  • Home routers make it difficult to open ports and most consumers do not go to the administrative interface to change them

  • Servers need static IP addresses with security

Solution: NVIS AI

1. No public attack surface

NVIS AI does not expose public IP addresses, so the risks described above are eliminated.

In addition, there are many known vulnerabilities associated with any remote desktop protocol. NVIS AI future-proofs any remote desktop solution by hiding the known exploits as well as ones that have not been discovered yet.

2. Easy implementation

NVIS AI does not require NAT, special firewall rules, routing, port forwarding, or third-party static IP subscriptions (like DDNS protocol) for each workstation. With NVIS AI, it just works.

3. Faster performance

Without routing and being peer-to-peer, there is less delay and overhead. In some cases, performance has doubled.

Last updated