In this article we want to describe technical functionality of one of the most frequently used cloud remote access service - LogMeIn. We would like to focus not only on LogMeIn service itself, but explain IT terms to a common user as well. Is it safe to use cloud services as transfer paths by the whole company? Would it be possible to be a man in the middle and steal some secret files? You should be able to answer these questions after reading this article.
As you know, LogMeIn company offers many services that enable to gain the whole network infrastructure on-demand. You can get all necessary tools cheaper and faster than by a common way - to buy and configure expensive hardware and software. Price is not the only strong advantage of a cloud network infrastructure. There is also another one - up-to-date security of transmission lines and an assurance that the latest standards are fulfilled.
Short description of LogMeIn technical architecture
There are three components in LogMeIn technical architecture - the client, the host and the LogMeIn data center. If you enter your unique ID and password you will be redirected to the LogMeIn data center where your request for connection with another computer will be processed. The major difference from the default Microsoft´s Remote Desktop is that this data center (LogMeIn cloud) is in the middle. For better understanding look at following scheme.
Security connection between devices
LogMeIn own methods - Intrusion Filters
Denial of Service Filter