MSP360 Connect Features
Administration (8)
Session Recording
Provides the ability to record remote access and support sessions
Session Transfer
Allows remote access and support sessions to be transferred between users
Unattended Access
Allows administrators access to devices, regardless of end-user's presence
File Sharing
Allows remote users to share files with other remote users
User, Role, and Access Management
Grant access to select data, features, objects, etc. based on the users, user role, groups, etc.
Policy, User, and Role Management - Privileged Access Manager
Creates access requirements and standards and establishes user, roles, and access rights.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Governance
Allows users to create, edit, and relinquish user access privileges.
Platform (3)
Cross-Platform Access
Allows remote usage and access across a range of operating systems and device types
Mobile Device Access
Allows remote desktop administrators access to connected mobile devices
Remote Device Control
Allows administators to take control of a connected endpoint device
Security (1)
Device Management
Unifies endpoint management of employee devices
Functionality (5)
Temporary, time-limited privilege
Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Access Control
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Workflows
Facilitate access from initial access ticket submission through supporting chain of custody throughout the workflow for OT environments.
Reporting (4)
Reporting
Includes reporting functionality.
Audit Logs
Creates a comprehnsive log of all activities when utilizing accessmanagement software.
Activity Monitoring
Monitors user activity, documents behaviors for baselining and anomaly detection.
Security Frameworks
Follows industry-specific security frameworks such as IEC 62443 and NIST SP 800-82.




