Image

Secure remote access from start to finish

The security-first standard

Our development is guided by a security-first principle, integrating robust technologies and rigorous compliance standards into every layer. This unwavering focus on protection is the reason SetMe is the chosen solution for institutions that cannot compromise on security.

Uncompromising end-to-end encryption

Every byte of data in a SetMe session is end-to-end encrypted before it leaves your device. This ensures true protection for all communications with a remote computer - including the desktop stream, keyboard & mouse inputs, file transfers, clipboard data, chat messages, and authentication credentials.

AES 256-bit encryption

A unique, temporary encryption key is generated for each session using Elliptic-Curve Diffie-Hellman (ECDH). This key is used to securely establish a symmetric AES-256 session key. The result is a protected end-to-end channel between the local and remote devices, ensuring that every session is encrypted with its own strong, ephemeral key.

Regulatory compliance

SetMe provides the most secure way to manage remote computers and transfer data, leveraging AES 256-bit encryption and multi-factor authentication. This security foundation enables organizations to meet stringent regulatory requirements, including PCI DSS and HIPAA.

Code signing

All SetMe components are digitally signed with a code signing certificate. This verifies SetMe as a trusted software publisher and guarantees the integrity of the code, confirming it has not been altered by any third party. The signing keys are safeguarded using a FIPS 140-3 Level 3 validated Hardware Security Module (HSM)

Multi-factor authentication

SetMe supports multi-factor authentication (MFA) using time-based one-time passcodes (TOTP) from authenticator apps such as Google/Microsoft Authenticator, Duo Mobile or Authy. This adds an extra security layer to protect both your account and unattended machines.

Image

Additional security measures for maximum protection

End-to-end code integrity

We guarantee the integrity of SetMe through a mandatory two-step verification: every component is digitally signed, and each signature is cryptographically validated on the end-user's device prior to execution. This dual-layer enforcement ensures the application remains tamper-proof throughout its entire lifecycle, from build to delivery and runtime.

Complete isolation of critical components

All critical infrastructure components are maintained under strict physical and logical isolation. Access to these core systems is highly restricted and managed through rigorous, role-based protocols. This isolation ensures that the core infrastructure remains impervious to unauthorized impact, even if auxiliary components are compromised, be it through technical exploits or social engineering attacks

Proactive 24/7 security monitoring

Our dedicated security team conducts continuous, round-the-clock monitoring of our entire infrastructure. This proactive vigilance is supported by the immediate implementation of all relevant security patches. Should any anomalous activity be detected, we enact a swift, predefined response to investigate and eliminate the threat.

Zero trust security

To proactively counter modern threats, SetMe enforces a Zero Trust architecture founded on the principle of "assume breach, verify everything." This means every action, connection, and command is continuously authenticated, authorized and validated.

We are committed to ensuring that all our customer data are treated in a way that complies with the EU's General Data Protection Regulation (GDPR). We have implemented robust technical measures and internal policies to support GDPR compliance.

Image

Start using SetMe for free today

Get started with secure, low-latency remote access — built for compliance and admin transparency.