Any connection attempt that is not using SSL/TLS will be refused. These tokens, or session identifiers, are protected using advanced web security mechanisms, including the use of cryptographically strong pseudo-random number generators and session hijacking/fixation countermeasures.ģ 3 All access to GoToAssist Service Desk, whether pre- or post-authentication, is permitted only over connections that are secured with SSL/TLS.
Once a user is authenticated, continued access to the system is dependent upon the presence of a set of security tokens exchanged with the client during the authentication process.
#Gotoassist mac security settings password#
In addition, numerous techniques are employed to detect and prevent unauthorized account access, such as complex password enforcement, soft and hard account lockout triggered by repeated unsuccessful log-in attempts and the logging and continuous monitoring of account probing and other anomalous behavior. No guest or anonymous access to the system is permitted. To begin with, all users must be registered using a valid account, which is associated with an identified organization. For this reason, GoToAssist Service Desk, as with all Citrix SaaS offerings, places great emphasis on user authentication. Every manner of application, data and network security could be applied to a system, but if we were not able to reliably identify those accessing the system, all our efforts toward security would be in vain. Protecting the front door An essential element of information security is the reliable identification and authentication of those accessing the information.
#Gotoassist mac security settings software#
This white paper describes some of those measures, including access controls, physical and operational security, data security and software development lifecycle security. Extensive measures have been undertaken to maintain the privacy and integrity of all data managed by GoToAssist Service Desk. Security encompasses all aspects of GoToAssist Service Desk, from the software to the facilities to the personnel developing and operating the service. Security is not an afterthought to functionality, but a key element that is designed and built into our systems from the ground up. Citrix considers the security of your information to be of the highest importance. This white paper outlines the measures that GoToAssist Service Desk utilizes to minimize security risks. With the worldwide surge in privacy breaches, malware, viruses and denial-of-service attacks, it s important to scrutinize each and every IT solution to see that it is employing the most up-to-date and effective security measures available. 1 Citrix GoToAssist Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data.Ģ 2 Many service desk operations regularly deal with sensitive data, and support organizations and IT teams are rightly concerned with security.