Remote desktop
This article describes how NVIS AI secures and future-proofs any remote desktop protocol, while increasing performance.
Introduction
NVIS AI is protocol-agnostic, especially for any type of remote desktop protocol. With many known vulnerabilities and performance issues that remote desktop has, NVIS AI is able to secure and future-proof those solutions.
Problems
1. Public IP addresses exposed
With public IP addresses used for Remote Desktop, organizations are exposed to the following risks:
Protocol hacks
Port blocking
Geolocation/tracking
Packet injection
Packet sniff/capture
Man-in-the-middle (MITM) attacks
Distributed Denial of Service (DDoS) attacks
2. Dynamic IP addresses
Business users and hosting services may get static IP addresses. For consumers, many ISPs assign dynamic IP addresses for home routers or broadband users.
Issues with dynamic IP addresses include:
Lack of secure remote access
No security - the typical user does not want their personal device exposed to the internet and lack technical skills to setup firewalls, port blockers, and/or VPNs to secure them
Home routers make it difficult to open ports and most consumers do not go to the administrative interface to change them
Servers need static IP addresses with security
Solution: NVIS AI
1. No public attack surface
NVIS AI does not expose public IP addresses, so the risks described above are eliminated.
In addition, there are many known vulnerabilities associated with any remote desktop protocol. NVIS AI future-proofs any remote desktop solution by hiding the known exploits as well as ones that have not been discovered yet.
2. Easy implementation
NVIS AI does not require NAT, special firewall rules, routing, port forwarding, or third-party static IP subscriptions (like DDNS protocol) for each workstation. With NVIS AI, it just works.
3. Faster performance
Without routing and being peer-to-peer, there is less delay and overhead. In some cases, performance has doubled.
Last updated