![]() ![]() When a user logs on to, the user's browser verifies the identity of the server behind the scenes, using the server's certificate, just like the hosts do. These credentials are transmitted by the host to the server over the authenticated SSL/TLS connection. The host's identity is verified based on a pre-assigned identifier and a pre-shared secret. The LogMeIn server's identity is verified using its PKI certificate. This connection is secured using SSL/TLS. LogMeIn hosts maintain a persistent connection with a LogMeIn server. It provides authentication and protection against eavesdropping, tampering and message forgery. ![]() The same protocol is the standard for web-based commerce or online banking. ![]() The communications protocol used by LogMeIn Pro is SSL/TLS (OpenSSL). For more details please see the LogMeIn Security Whitepaper. This is a summary of the most important security highlights of the LogMeIn Pro products. Nobody will be able to see or access the data transmitted between your computers - not even us. As part of this commitment our datacenters and source code are continually reviewed by independent, accredited third party audit firms to ensure data that your information remains confidential.Īll communications by LogMeIn products use industry-standard algorithms and protocols for encryption and authentication. Our products are architected with security being the most important design objective. At LogMeIn, we take the security and protection of your important files, data, and personal information very seriously. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |