USER AUTHENTICATION
Each connection needs to authenticate by providing user name and password
USER RESTRICTION BY IP ADDRESS AND FOLDERS ACCESS
It is possibile to restrict users by their IP address and to limit filesystem access.
USER SESSIONS ISOLATION
Each connection runs in a separate server-side process, this avoids that one session crash could impact the others
ENCRYPTED LOGIN
The login mechanism is handled by a runtime generated asymmetric key exchange.
CONNECTION AUTO RECOVERY
The client library automatically restores the connection if it was lost or where it is unstable.
BLACKLIST
The service automatically put in a blacklist the IP address which fail authentication or doesn’t send recognized command after 20 times.
RAPID INSTALLATION AND CONFIGURATION
The setup quickly and simply installs all the software and write all the settings needed to taste its main features.