Your IP: Unknown · Your Status: ProtectedUnprotectedUnknown

Skip to main content

Remote computer

Remote computer

(also remote system)

Remote computer definition

A remote computer is any computer that is in a different location than the user and allows that user to access and control the system. When users connect to a remote computer, they can perform various tasks as if physically in front of the device, including file sharing, accessing applications, troubleshooting, and monitoring system performance. Therefore, remote computers are particularly useful for system administrators who need to manage multiple computers from a central location or for individuals who work from home or travel frequently but still need access to their computers.

See also: remote desktop, remote access server

Applications that enable remote access

  • Remote Desktop Protocol (RDP).
  • Virtual Network Computing (VNC).
  • Secure Shell (SSH).
  • TeamViewer.
  • LogMeIn.
  • AnyDesk.
  • Citrix Virtual Apps and Desktops.
  • Chrome Remote Desktop.

Benefits of remote access

  • Enables flexible and convenient access to computers from anywhere.
  • Saves businesses money on office space, equipment, and utilities.
  • Streamlines centralized management for IT professionals.
  • Facilitates improved support and troubleshooting for IT teams.
  • Allows access to specialized resources and promotes collaboration.
  • Ensures business continuity during disasters or unexpected events.

Risks of using remote access

  • Unauthorized access. If an organization doesn’t implement proper security measures, hackers can exploit weaknesses in remote access tools or intercept sensitive data.
  • Insider threats. Since remote access grants employees access to sensitive information from outside the office, it increases insider threat risks.
  • Reliability issues. Remote access relies on the internet or other communication networks to connect the user and the remote computer. So, connectivity problems, network latency, or hardware failures can disrupt remote access, thereby impacting productivity.
  • Bandwidth limitations. Remote access can consume significant amounts of network bandwidth, especially when users transfer large files or use resource-intensive applications. Consequently, high bandwidth usage might affect the performance of other applications or systems on the same network.

Further reading

Ultimate digital security