Secure remote management

Security: We take IT seriously

Supremo is a remote monitoring, management and support software. It allows you to access and control remote endpoints with the highest security standards, including customisable security features.

How do we protect more than 1.2 million daily users in 150 countries?

Security as a standard

We protect you, regardless of why you use Supremo

Encrypted connections

Secure your sessions with TLS 1.2 protocol, ensuring safe data transmission. Even the file manager uses encryption to protect file transfers.

Brute Force protection

Anti-brute force detects and blocks repeated failed login attempts, ensuring that malicious users cannot access workstations through brute force.

Random passwords

Generate random passwords of customizable lengths. Random passwords can even be disabled to enhance security when not in use, adding flexibility and control over your IT infrastructure.

Personal passwords

To enhance security and facilitate your workflow, you can also set up multiple fixed passwords on your devices. You can use those passwords when you connect to the Supremo ID where they have been activated.

Features for your security

We adhere to the standards in industry best practice for the development and testing

User authorization

The user receiving the connection request must grant authorization, therefore no unauthorized remote sessions occur without explicit approval.

ID Whitelist

Create an ID whitelist to limit access to specific machines. Only approved IDs can connect, providing an additional layer of security.

Connect with Two-factor authentication

Two-factor authentication can be enabled to work starting at any connection. It adds a layer of security to remote connections by requiring, in addition to the password, a temporary verification code generated by an authenticator app.

Password-protect settings configuration

Protect your configurations with a password, preventing unauthorized changes to critical settings and letting only trusted users can access system preferences.

Email alerts

Receive email alerts when unauthorized access attempts are made to your Address Book. The alerts include details like IP address and timestamp, to stay informed of potential security threats.

Lock after sessions

Automatically lock the remote endpoints once the session ends. This prevents unauthorized users from accessing those accounts after the remote session closes.

Get started with a centralized protection

Our Console is the industry-leading endpoint management platform trusted by thousands of MSPs and IT teams

Detailed connection reporting

Track all connections made to your machines and from your collaborators with detailed connection reports. Monitor and audit remote access to maintain control over your customers’ infrastructure.

2FA for Reports and Address Book

Add an extra layer of security with Two-Factor authentication, required to access the Console, Address Book, and reports for sensitive management areas.

Monitoring policies

Set custom monitoring policies on remote endpoints to track performance, detect anomalies, and enforce security protocols. Automatically keep your network secure and efficient.

OS Patching

Ensure the security of remote endpoints by regularly patching operating systems. Regular updates help protect against vulnerabilities and ensure compliance.

Cloud Security & Compliance

To ensure the highest level of security compliance, we partner with two industry-leading Cloud Service Providers (CSPs) like Amazon Web Services (AWS) and OVHcloud. Both providers adhere to strict security standards and comply with global data protection regulations to safeguard your business and ensure service reliability.


AWS logo

Amazon Web Services (AWS) offers a robust, scalable infrastructure, with comprehensive compliance frameworks including SOC, GDPR, HIPAA, and ISO certifications. AWS ensures data encryption, identity management, and extensive monitoring to maintain a secure environment. More details about AWS’s security protocols can be found here.

OVHcloud logo

OVHcloud emphasizes strong data protection policies, focusing on data integrity, confidentiality, and availability. Their infrastructure is built to comply with GDPR and other international data protection standards. You can learn more about their security measures here.

With reliable CSP powering our software, you benefit from a secure, compliant, and globally available infrastructure

Because security matters

Download and try our remote monitoring and support solution for free. Or, contact us to discuss your needs.

IT professional working with his PC using secure remote desktop software Supremo