SecureLink’s Gatekeeper

Set Your Rules - Get Back To Business

SecureLink has bridged the gap between technology providers and the businesses they support. We are focused on fast, secure connections.

In large companies, painless connectivity is paramount; in regulated industries, security drives operational decisions. We have modeled our product to cater to businesses that are both expanding and require elite security and forensic auditing. Enter the Gatekeeper.

SecureLink’s Gatekeeper is a small piece of software used by organizations to enable secure remote support from their technology providers. The technology customer controls all access and connection rules.

How It Works

The SecureLink remote support method is made up of two main components:
SecureLink Server and SecureLink Gatekeeper

SecureLink Server

The server provides a single point of control for identifying customers, connections specific to the customer, and the groups of support technicians allowed to access those connections for support.

SecureLink Gatekeeper

The Gatekeeper is a very lightweight piece of software that resides on the customer’s server and defines access rules for remote support connections.

Set The Rules:
  • Who (has access)
    • Each technician will have his or her own login credentials. No More Sharing. Ability to restrictions at the account level
  • When (each account can enter the network)
    • Define permissions schedule - day, date, hour
  • Where (the technician can go on the system)
    • Create boundaries to protect privacy. No more snooping
  • What (activities can be performed)
    • Activity can be monitored and controlled through simple settings

High Definition Audit

Gatekeeper has high definition audit that's tied to individual users. Our settings allow you to receive an e-mail each time someone connects and a detailed report of all activity, including files transferred, commands entered, even video replay of desktop sharing and RDP sessions.

Secure and Streamlined

The Gatekeeper provides a highly secure environment while enabling fast connections. The customer controls access and the support technician enjoys decreased time to resolution.

“We evaluated several solutions to make support & service more effective. SecureLink scored highest for both security & utility.”

Jim Reed
Customer Support, SVP

Security Settings

To ensure only authorized personnel are granted remote access, the Gatekeeper possesses a series of advanced security protections, including:

Outbound connection

Once installed and enabled, the Gatekeeper sends an outbound “ping” over SSH on regular polling intervals to the SecureLink server checking to see if anyone is requesting a remote connection.

Four-tier Encryption

Users can choose between four encryption options to secure the communications between the SecureLink server and the system hosting the Gatekeeper AES (Rijndael block cipher, the current Advanced Encryption Standard) in 128, 192, and 256 bit modes, Blowfish, or Triple-DES.

Software Updates

The Gatekeeper can be configured to download a newer version if one is available. Upgrades are installed automatically after the support session is complete and the connection is closed.

Strict password guidelines

Access to enable or disable Gatekeepers can be restricted by passwords.

Connectivity Settings

The Gatekeeper provides granular settings to manage remote access. Connection status can be managed in multiple ways, including:

  • Defined schedule - Day, date, hour
  • Timed access - Disabled after allocation has elapsed
  • Manual control – Customer can enable or disable access at any time

Notification Settings

Customers can be alerted through connection notifications.

An email will be sent letting the customer know when a connection has been attempted and/or granted.

Vendor Privileges

The Gatekeeper includes built-in tools that support technicians use to diagnose and resolve software issues (FTP, shared desktop, command prompt).

Customers can configure the Gatekeeper with access lists that contain hosts or IP addresses and ports the vendor is allowed to access.