Keep your MSP Secure with LogMeIn Central

Cyber criminals are targeting MSPs more and more due to the number of accounts they have access to on their networks.  MSPs need to be consistently vigilant with their security practices and ensure that they are partnering with software vendors that also prioritize security.

LogMeIn prioritizes the security of our software solutions to guarantee that we’re providing best-in-class security to keep your business and users secure (and to provide you peace of mind).

Here are a few ways we work to keep you secure:

Data Encryption

LogMeIn uses 256-bit SSL encryption on data that is passed from the host through the internet. This ensures that your data is protected while being transmitted outside of your network.

Multi-Factor Authentication

LogMeIn recommends all users introduce multi-factor authentication to add an additional layer of protection to their account. In Central, customers can choose to receive codes via the LastPass authentication app, text message, or email. To learn more about adding multi-factor authentication to your account, visit help.logmein.com.

Intrusion Detection Technology

In LogMeIn Central, we have multiple intrusion detection filters to safeguard your account.  First, we employ a TLS Filter to ensure that data is not changed in transit. Second, we employ our own filters to protect against malicious behavior. These filters include an IP address filter, Denial of Service filter, and Authentication filter. These filters are built to flag any malicious behavior and reject the connection attempt.

Software Updates

The LogMeIn host, based on user preferences, can semi-automatically or automatically update itself on the user’s computer.  These software updates are digitally signed with a private key that protects customers in the result of one of the LogMeIn data centers being compromised.

When it comes to your business’ security, do not compromise with a vendor that doesn’t take it seriously.

To learn more about our security practices, read our security whitepaper.

    

Written by