Error Icon

Something went wrong. Please try again

loading...
Home>Solutions>Remote Safely
Remote by design rctngl

Remote Safely Security Solution for Remote Teams

4.3

(58 ratings)
Loading
Remote by design rctngl

Remote Safely

get it now
Overview
Differentiators
Features
Awards
Reviews
Overview
Differentiators
Features
Awards
Reviews

Solution Overview

Remote Safely is a multi-layer security solution that can address the immediate cybersecurity challenges businesses face in the era of the dispersed workforce.

Remote Safely replaces physical security controls (security guards, CCTV, door locks, etc.) with virtual capabilities built on cloud services, artificial intelligence, VDI capabilities, custom hardware and secured network configurations.

Remote Safely mitigates the risks of data leakages associated with human-based “low/no-tech” attacks such as visual hacking. It verifies the identity of the person located in the camera view area via facial biometrics and detects/prevents suspicious events such as:

  • The screen is left unlocked when a remote agent is away, so another person can gain access to valuable information.
  • An unknown person is located in front of the desktop, and they can see the content displayed on the screen.
  • An employee projects data to an external monitor so that the data can be seen by other people.
  • Valuable information can be screen captured or photographed.

The information about suspicious events appears on the Remote Safely Panel, a Web Console where security team members can monitor and resolve potential security incidents, for example by locking or blocking workstations of remote employees.

Remote Safely enables businesses to offer greater flexibility to their workforce, allowing their teams to focus on what they do best and trust their data is secure. For many industries, this has never been an option and it opens up a world of possibilities.

Customer problem

As companies have adapted to digital transformation and the pandemic’s systemic disruptions, more businesses than ever are managing remote workers. This move from secure, corporate facilities to home environments adds the residual risk of sensitive data being accessed or viewed by the wrong people.

A stranger may get physical access to corporate information when the workstation is left unlocked or simply steal sensitive data via shoulder surfing and photographing the screen. In offices, such risks are mitigated by traditional security controls (e.g., CCTV, door locks, etc.); however, the nature of remote workspaces makes visual hacking a real threat that should not be underestimated. Therefore, since companies have shifted to remote work, there is a demand for solutions that provide a replacement for traditional security controls to mitigate security risks associated with physical security in remote workplaces.

EPAM Solution

Remote Safely is a set of security controls that include an application installed on a remote employee’s laptop and a complex AI infrastructure providing real-time user verification and detecting potentially malicious events.

Remote Safely verifies the identity of the person located in the camera view area and detects suspicious behavior that may cause data leakage. It takes photos of the camera view area and passes them to the Security Operational Server.

The AI processes the images to verify the user and screen for anomalous behavior. If there is any misconduct detected on the image, the alert appears on SOC Web Panel. Members of the SOC Monitoring Team analyze the employee’s images to detect any suspicious behavior and provide a measure to resolve potential security incidents.

Remote Safely How it works
Remote Safely Proctoring Page
Remote Safely NoPerson Found
Remote Safely Unknown Person
Remote Safely Multiple People
Remote Safely Phone Camera
Remote Safely Users Page
RemoteSafely Rules
RemoteSafely Settings
Remote Safely Product Demo
Remote Safely How it works
Remote Safely Proctoring Page
Remote Safely NoPerson Found
Remote Safely Unknown Person
Remote Safely Multiple People
Remote Safely Phone Camera
Remote Safely Users Page
RemoteSafely Rules
RemoteSafely Settings
Remote Safely Product Demo

1/10

Key Differentiators

AI based Security Controls to prevent data leakage

Security controls combining multiple protection such as AI-based risks detection, monitoring team and virtual desktops

24/7 Monitoring Team to resolve incidents

SOC’s team real time monitoring of security incidents adds the additional protection layer preventing data breach

Enhanced physical security controls for remote teams

Uniquely designed wide-angle camera extends the visibility area and allows to detect more potential threats

Benefits

Seamless User Identity Verification

1:1 biometric verification to ensure only authorized people can access the data.

Detect & Alert Suspicious Behavior

Get alerted if there are suspicious events detected in the camera view area.

SOC Team 24/7 Monitoring

SOC team resolves the security incidents to minimize risks of data leakage.

Custom Automatisation to Prevent Data Leakage

Setup rules for automated response in case of suspicious events.

Control Access To Corporate Infrastructure

Improve access control to corporate data via customizable posture checks.

Features

  • Remote employee identity verification via face biometrics and deep learning algorithms.
  • Monitoring of the remote employee’s workplace over the camera and alerting when suspicious events are detected. Examples of such events are ‘No person found’, ‘Unknown Person’, ‘Multiple Persons’, ‘Phone is detected’, and ‘Spoofing is detected’.
  • SOC Web Panel for real-time digital monitoring of suspicious events and mitigating security risks when necessary.
  • Real-time notifications via email.
  • Customized rules for automatic execution of actions as responses to security events.
  • Block attempts at screen sharing and taking screenshots, project data to unauthorized monitors, and connecting to the desktop via RDP (can be enabled/disabled by configuration).
  • Control access to the corporate environment based on the state of digital monitoring.
  • Optional extra physical security hardening via privacy screens and a custom wide-angle camera.
  • Compliant with the strongest data protection regulations. Minimum impact to employees’ privacy.
  • Can be delivered as an EPAM-managed cloud-based solution or deployed on the customer’s infrastructure.

Awards

remote safety award ISO

ISO 27701 (PIMPS)

ISO 27701 was developed to provide a standard for data privacy controls, which, when coupled with an ISMS, allows an organisation to demonstrate effective privacy data management. ISO 27701 establishes the parameters for a PIMS in terms of privacy protection and processing personally identifiable information (PII).
remote safety award SOC logo

SOC 2 (ISAE 3000) Type II

SOC 2 is developed by the AICPA (American Institute of CPA’s) and defines criteria for the management of user organizations’ data based on the Trust Service Criteria – The Trust Service Criteria relate to security, availability, processing integrity, confidentiality and privacy related controls. A SOC 2 report ensures that a service organization keeps data private and secure while processing or in storage, that data is accessible at any time and that specific controls are implemented relating to confidentiality and privacy of information.
remote safety award SOC logo

System and Organization Controls (SOC 3)

A System and Organization Controls 3 (SOC 3) report outlines information related to a service organization's internal controls for security, availability, processing integrity, confidentiality, and privacy. SOC 3 reports assure clients that an organization's controls and processes pertaining to the protection of sensitive customer data are up to industry standards.
remote safety award IOActive

IOActive Security Assessment

EPAM engaged IOActive to assess the security threats and risks associated with its Remote Safely mobile and web applications and associated API. EPAM remediated all of the reported vulnerabilities during the engagement, and IOActive confirmed they were properly fixed.

Customer Ratings & Reviews

4.3

Based on 58 votes

5 stars
29
4 stars
18
3 stars
9
2 stars
2
1 star
0
5 stars
29
4 stars
18
3 stars
9
2 stars
2
1 star
0
Most recent reviews

September 24, 2022

Since we've switched to working remotely, Remote Safely has been a huge help. It's been a great way to keep our data secure and our employees accountable. I would highly recommend it to any company looking for a way to improve its cybersecurity.

Author: Ashton Leach

2 users found this review helpful

May 25, 2022

We have been using Remote Safely for a while now and it has been a great help in keeping our data safe. With Remote Safely, we are able to verify the identity of our remote employees and detect any suspicious behavior that may lead to data leakage. Now we are sure that only authorised persons have access to our confidential data. In case of any suspicious events, we are alerted immediately.

Author: Tomas Nicholls

February 20, 2022

Any company whose employees work from home should definitely consider this amazing solution. We decided to deploy it on EPAM cloud infrastructure and thanks to the wide-angle camera the visibility area is extended which allows detecting more potential threats. We've settled our data security issues without hurting privacy and ethical principles.

Author: Arianna Nash

Questions & Answers

Have a question? We are ready to help you.

license type

categories

Integrates with

Global Protect VPN

Splunk

Princeton Identity

Version

v.3.3.1

Updated on February 17, 2023

Get solution in 3 simple steps

We can help you achieve more! Choose the solution that supports your growth and success.

01

Reach Out to Us

Request the solution by submitting a short form

02

Sit Back & Relax

Our experts swiftly process your request and get back to you

03

Start Using The Solution

Dive in and unlock all the benefits

Loading...