Bring the power of banking-grade security to your remote support. With proactive audits, increased security options for enterprises and regulated industries, and the highest security protocols available for remote support tools, Rescue ensures users and your business stay equally protected, no matter what.
Elevate your security with:
Keep the power to control access in your hands. With Rescue, you can use technician and admin permissions to customize your deployment around the level of access you want users to have. You can even add custom terms and conditions for users to accept before each session begins.
Rescue’s 40+ permission-based functions include:
Need extra assurance? With optional enterprise security layers, you can take Rescue’s industry-leading security even farther. Now you can:
Keep control over your data storage and retention policy. With Rescue, you can control where and how PII is stored – if stored at all – so you can experience complete data flexibility.
Record every session for auditing and compliance, and run the reports you need for full visibility into customer surveys, technician performance, login history, and session metrics.
With secure user onboarding with AD, admins’ jobs are easier too. There’s just one pool of users to manage. Any user changes in AD are automatically synched to Rescue.
Use SSO to securely log in to Rescue with the same identity used for other enterprise applications, saving time and frustration. Add another level of security with two-step verification, including time-based codes, one-tap prompts, and more.
Stay secure with banking-grade end-to-end 256-bit Advanced Encryption Standard (AES) and TLS 1.2 transport security.