{"version":"1.0","provider_name":"RealVNC\u00ae","provider_url":"https:\/\/www.realvnc.com\/en\/","author_name":"Bogdan Bele","author_url":"https:\/\/www.realvnc.com\/en\/news\/author\/bogdan\/","title":"Important Security Considerations When Integrating Remote Access into Your Product","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ssAF2hFn3C\"><a href=\"https:\/\/www.realvnc.com\/en\/blog\/integrating-remote-access-security\/\">Important Security Considerations When Integrating Remote Access into Your Product<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.realvnc.com\/en\/blog\/integrating-remote-access-security\/embed\/#?secret=ssAF2hFn3C\" width=\"600\" height=\"338\" title=\"&#8220;Important Security Considerations When Integrating Remote Access into Your Product&#8221; &#8212; RealVNC\u00ae\" data-secret=\"ssAF2hFn3C\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.realvnc.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2025\/03\/Integrating-Remote-Access-Security.jpg","thumbnail_width":800,"thumbnail_height":533,"description":"One of the main reasons to partner with RealVNC for your remote access integration is, undoubtedly, the security the company\u2019s products are known for. RealVNC has security at the heart of everything it does, developing its products by putting it first. Find out more in our article."}