Secure Remote Access

Support your workforce from anywhere. Eliminate VPNs, jump servers, and infrastructure complexity while strengthening security.

If Your Team Needs Help, Distance Shouldn't Matter

The power of truly flexible remote support.

Your CFO is overseas and their laptop starts acting up. A field service technician is out on job sites all day and can’t stop for support. Retail POS workstations need regular updates, patches, and maintenance, but every minute of downtime means lost sales.

With Unattended Access you can:

  • Service workstations remotely when the user isn’t present
  • Resolve issues without accessing sensitive data
  • Perform maintenance after hours with no lost revenue
  • Support locked down workstations that can’t be touched during business hours

Secure Remote Access changes everything.

» admin by request

Three Core Remote Access & Management Features

Remote Support

Screen sharing and remote control for IT support. Users can request help instantly, and IT can provide assistance without complex setup

User-initiated or admin-initiated sessions

Multi-monitor support with screen switching

View-only mode for sensitive devices

Automatic session recording

MFA protection for admin access

Unattended Access

Connect to servers and workstations without anyone present. Perfect for maintenance, monitoring, and after-hours administration.

Browser-based RDP, SSH, and VNC

Cloud or on-premise gateway options

Password-less authentication

Automatic device discovery

256-character rotating passwords

Vendor Access

Give external partners secure access to specific systems without VPN complexity or permanent credentials.

No software installation required

Scope-limited access controls

SSO integration for easy management

Complete session auditing

Time-limited access grants

Watch a 3-Minute Demo of Vendor Access

Ready to elevate your remote work security? Request a demo today.

The future of remote work

Let us show you.

Leadership Insights

CEO & Director discuss the product, vision, impact, and more.

Secure Remote Access

6 Videos

The Complete Security Suite

Both Endpoint Privilege Management and Secure Remote Access come with these core Workstation Features. They work great on their own, but when combined, you get a powerful zero-trust security platform complete protection across your systems.

Auditlog

Track all privileged activity on servers

Inventory

Gather all details about devices in your network

Sub-settings

Create granular access controls

Auto-Approval

Allow auto-approval of requests for elevation

Endpoint MFA/SSO

Enforce business rules and compliance requirements

Integrations

Teams, Slack, Splunk, Sentinel, Intune, and more

Two ways to Deploy

Flexible configuration tailored to your needs

Managed Cloud Service

A fully managed setup with seamless operation via Admin By Request.

Prerequisites: Requires only an outbound connection to establish a secure tunnel and installation of the Admin By Request Server agent.

On Premises Implementation

On-premises deployment using Docker within your infrastructure.

Prerequisites: Involves running Docker containers and allowing outbound connections to Cloudflare for tunnel establishment.

Handcrafted in Denmark By System Administrators for System Administrators

VPN vs Cloudflare Tunnelling

VPN Vulnerabilities

» admin by request

Cloud Tunnelling Strengths

» admin by request

FAQs

Secure Remote Access is a Zero Trust, browser-based remote access solution that provides just-in-time connections to internal systems without requiring persistent VPN tunnels. Instead of always-on connections, our solution uses secure WebSocket sessions through Cloudflare tunnels or self-hosted gateways. When access is needed, users request permission through the portal, and once approved, they connect directly through their web browser. Sessions are automatically terminated when complete, eliminating standing access points that attackers could exploit.

Our Secure Remote Access solution includes three distinct components:  

  • Unattended Access provides protocol-level remote access (RDP, SSH, VNC) to endpoints without requiring a user to be present at the target device.  
  • Vendor Access allows external third parties to securely access internal systems through their web browsers via access.work, with scope-limited permissions.  
  • Remote Support enables live screen-sharing and control sessions between IT administrators and end users for helpdesk scenarios.  

All three components work through the same centralized management portal. 

External vendors and contractors access systems through our Vendor Access component via access.work, requiring no software installation on their devices. They authenticate securely and can only access systems within their approved scope. Every vendor interaction is fully logged and auditable, eliminating the need to create internal accounts for vendors or expose systems through traditional VPN access. 

Yes, our solution supports both deployment models. The cloud-hosted option requires no additional infrastructure and can be deployed immediately using our managed service. For organizations preferring on-premises control, we offer a Docker-based gateway that includes Connector, Proxy, and Discovery components. The on-premises option also supports device discovery of unmanaged endpoints and reverse proxy routing. 

Secure Remote Access supports RDP for Windows systems, SSH for Linux and Mac, and VNC for cross-platform screen sharing. All sessions use encrypted WebSocket connections and can be configured with multi-factor authentication. Optional video session recording captures complete screen activity for compliance review. Sessions include automatic expiry timers and inactivity timeouts to prevent forgotten connections. 

Remote access requests follow customizable approval workflows through the Admin By Request portal. When a user requests access, designated administrators receive notifications and can approve or deny requests through the web portal or mobile app. The system supports role-based access control, allowing different approval requirements based on user roles, target systems, or access types. For routine access patterns, administrators can configure automated approvals with specific conditions. 

Every remote access session generates comprehensive audit logs including user identity, target system, session duration, protocols used, and approval trail. Optional video session recording captures complete screen activity during Remote Support sessions. Session metadata includes contextual information like user roles and approval workflows. All data can be exported for SIEM integration or compliance reporting. 

Yes, our solution integrates with Azure AD, SAML providers, and Office365 for single sign-on authentication. This allows users to authenticate with their existing corporate credentials rather than managing separate accounts. SSO integration also enables conditional access policies and centralized user management. The system supports multi-factor authentication requirements and can enforce additional verification steps before initiating remote sessions. 

Traditional RDP deployments typically require direct network connections, open firewall ports, and persistent VPN tunnels that create security risks. While our Secure Remote Access still uses RDP as a protocol for Windows connections, we eliminate these vulnerabilities by brokering sessions through secure tunnels with outbound-only connections. Browser-based access eliminates RDP client software requirements, and unlike traditional RDP’s static credentials, every connection requires explicit approval rather than assumed access. 

All Core Features, 25 Seats, Completely Free

Your free plan includes 25 licenses for our Endpoint Privilege Management and Secure Remote Access products, so you can see just how easy it is to lock down endpoints, manage security, and support your workforce wherever they are.