
Inside Cato’s SASE Architecture: A Blueprint for Modern Security
🕓 January 26, 2025

Modern IT operations live and die by access control. Whether you are an MSP handling dozens of customer environments or an internal IT team supporting multiple departments and locations, the challenge is the same: give technicians exactly the access they need - and nothing more.
This is where Atera takes a deliberately structured approach. Instead of broad, one-size-fits-all permissions, Atera combines role-based access control with layered Splashtop policies, allowing organizations to enforce security without slowing down day-to-day support.
The result is a platform where remote access, automation, ticketing, and reporting are powerful - but always governed.
This article explains how Atera handles:
In Atera, a role is not just a job title — it is a clearly defined set of permissions that determines what a technician can see and do inside the platform. Roles apply across the full RMM and PSA stack, ensuring that access is consistent whether a technician is responding to tickets, managing devices, or initiating remote sessions.
Permission scope in Atera spans five core areas:
This structure ensures that permission decisions are not isolated to one function — they apply consistently across the entire operational workflow.
Atera starts with two preset roles that establish safe boundaries:
Beyond these presets, organizations can create unlimited custom roles. This is where Atera’s RBAC model becomes practical rather than theoretical.
Custom roles allow administrators to:
Roles can also be scoped to specific customers, sites, or folders, preventing technicians from even seeing environments they are not assigned to.
Splashtop is tightly integrated into Atera, but remote access is never “all or nothing.” Instead, Splashtop usage is governed by two layers working together:
Splashtop access can be controlled at multiple levels:
This allows organizations to enforce rules such as:
Additional controls like session timeouts, attended-only access, auto-lock after sessions, and screen blanking further tighten security without impacting productivity.
For MSPs, the biggest operational risk is cross-customer exposure — even accidental. Atera’s permission model addresses this directly.
With role scoping:
This removes the need for manual access adjustments during onboarding or offboarding and ensures customer isolation by design. It also simplifies audits and strengthens trust when customers ask how access is controlled.
Internal IT teams face a different challenge: managing access across departments, locations, and skill levels.
Atera supports this by enabling:
New team members can start in a safe, view-only role, while senior engineers retain the ability to manage automation, policies, and platform-wide settings.
Access control only works if actions are traceable. Atera addresses this through comprehensive logging:
This level of visibility supports both internal governance and external compliance requirements, without adding operational overhead.
Atera’s permission system is intentionally structured, and that means some boundaries are fixed:
Rather than being limitations, these constraints create predictable behavior — critical for secure operations at scale.
Granular permissions in Atera are not an afterthought — they are foundational.
By combining role-based access with layered Splashtop policies, Atera enables:
The result is an IT environment where access is deliberate, remote support is controlled, and growth does not come at the expense of security.
Prevent cross-customer access by design, not policy→ Schedule a 30-minute Atera RBAC review.

Atera RMM allows technicians to be restricted to specific customers, sites, or folders. This ensures MSP technicians cannot see or access devices outside their assigned environments, preventing cross-customer exposure.
Yes. Splashtop access is governed by role-based permissions in Atera. Technicians must have explicit remote connection rights, and additional restrictions can be enforced using configuration policies.
Atera PSA allows roles to control whether technicians see only assigned tickets, unassigned tickets, or all tickets. This helps separate helpdesk workflows from administrative oversight.
Yes. Atera supports device-type-specific permissions, allowing administrators to enable remote actions for desktops while restricting server access to senior roles.
All Splashtop sessions are logged in Atera. Session activity, technician identity, and timestamps are available for review, supporting compliance and accountability.
By assigning junior staff to restricted roles and limiting automation or script execution, Atera helps prevent accidental changes while still allowing effective day-to-day support.
Yes. AI features in Atera operate within the permissions assigned to the technician’s role. Advanced AI capabilities require full administrative access.

Anas is an Expert in Network and Security Infrastructure, With over seven years of industry experience, holding certifications Including CCIE- Enterprise, PCNSE, Cato SASE Expert, and Atera Certified Master. Anas provides his valuable insights and expertise to readers.
Share it with friends!

🕓 February 6, 2026
.webp&w=3840&q=75)
🕓 February 2, 2026

🕓 February 1, 2026
share your thoughts