TeamViewer GmbH was founded in 2005, and is headquartered in Göppingen, Germany, with offices is Australia, Asia, and the United States. We develop and sell remote connectivity software for secure remote access and support, IoT solutions, customer engagement, and industrial augmented reality workflows. Within a short span of time, the free version of TeamViewer has led to rapid growth, with more than 200 million users of the TeamViewer software on more than 2.5 billion devices, in more than 200 countries around the world. The software is available in more than 30 languages.

Fundamentals of TeamViewer Security

TeamViewer is used by more than 45 million users at a time, on any given day. These users provide spontaneous support over the internet, accessing unattended computers (e.g. providing remote support for servers) and host online meetings. Depending on the configuration, TeamViewer can be used to remotely control the mouse and keyboard of another computer in real time, as though you were accessing it in person.

If a Windows, Mac, or Linux administrator logs in to a remote computer, that person will be granted administrator rights to that computer as well. Clearly, using this powerful functionality over the internet must be protected with stringent security protocols. As such, we put security at the center of everything we do by engineering our software by security by design.

Our goal is to ensure access to computers is safe. Your security is our highest priority: users only trust secure solutions and we’re fully committed to providing secure solutions to sustain long-term business success.

Quality Management

Security management is inconceivable without an established quality management system. TeamViewer GmbH is a leading global vendor in the market with an ISO 9001 certfied quality management system (QMS). Our quality management follows internationally recognized standards and is reviewed by external audits on an annual basis.

External Expert Assessment

TeamViewer software has been awarded a five-star quality seal, the maximum rating given by the Federal Association of IT Experts and Reviewers (Bundesverband der IT-Sachverständigen und Gutachter e.V., BISG e.V.). The independent reviewers of the BISG e.V. inspect products of qualified producers for their quality, security, and service characteristics.


Leading global enterprises across industries — such as financial services, healthcare, government, and other sectors with highly sensitive data — leverage TeamViewer for secure remote access and support, customer engagement, IoT, and industrial augmented reality solutions.

Connect Products

TeamViewer Security

All remote sessions are secured by end-to-end encryption.

Your Security Is Our Top Priority

Product Features

Remote Connections and Sessions

When establishing a remote session, TeamViewer determines the optimal type of connection. After the handshake through our master servers, a direct connection through User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) is established in 70 percent of all cases— even behind standard gateways, NATs, and firewalls. The rest of the connections are routed through our highly redundant router network via TCP or http-tunnelling. That means you don’t have to open any ports in order to use TeamViewer. As later described in the “Secure Connections” section, not even TeamViewer — as the operators of the routing servers — can read the encrypted data traffic.

Secure Connections

TeamViewer traffic is secured using RSA 4096 public/private key exchange and AES 256-bit session encryption. This technology is used in a comparable form for https/TLS and is considered completely safe by today’s standards. As the private key never leaves the client computer, this ensures that the interconnected computers, including the TeamViewer routing servers, cannot decipher the data stream. Each TeamViewer client has a certificate of the master cluster, enabling it to verify certificates of the TeamViewer system. These certificates are used in a handshake between participants of the TeamViewer network.

Password Authentication

Using the Secure Remote Password (SRP) protocol version 6, no password equivalent data is shared during the TeamViewer password authentication process. Only a password verifier is stored on the local computer.

Key Benefits

  1. Validation of TeamViewer IDs

  2. Brute-Force Protection

  3. Code Signing

  4. Data Centers and Backbone

  5. TeamViewer Account

  6. Management Console

  7. Application Security in TeamViewer

Mobile Device Support

Support Mobile and Commercial-Grade Devices — Anywhere, AnytimeNeed to access, manage, and support mobile devices, even when no one’s there? No problem just set up permanent unattended remote access to mobile devices, computers, and servers, or even IoT devices, point of sale (POS) machines, kiosks, or digital signage.Top Features:
  • Share Your Screen on iPhones and iPads
  • Transfer files  securely, and manage transfers in the Files app on iOS
  • Mobile-to-mobile  connections
  • View system diagnostics in the TeamViewer desktop app
  • Chat via text, take screenshots, or control processes on the supported device

Remote Access

Access Remote PCs, Mobiles, and Servers — or Work From HomeWorking from home. Away on business trips. With TeamViewer remote access tools, you can stay productive no matter where you are. Your desktop files and applications are just a few clicks away. Even mobile devices and servers can be securely accessed — all without VPN.Top Features:
  • Permanent access for unattended devices
  • Built-in TeamViewer Meeting videoconferencing
  • Black screen for private remote access
  • Secure, flexible file sharing
  • Remote Printing for Windows and MacOS

Remote Support

Deliver Instant Remote Support to Customers and EmployeesTech mishaps happen. Computer glitches, system crashes, and device failures can bring business to a standstill. Instead of making on-site service calls that take time and increase costs, IT pros choose TeamViewer to provide instant remote support for their clients.Top Features:
  • Ad-hoc support for clients and employees
  • Custom branding for support applications
  • Integrated service case management and integrations for major service desk systems
  • Leave sticky notes on remote computers
  • Integrations for Mobile Device Management and other app

Available AddOns