Evaluating Your Remote Proctoring Provider: What’s at Stake

No comments

Choosing a remote proctoring provider is one of the most critical decisions a testing program can make. On the surface, many providers appear similar by promising secure browsers, monitoring, and deterrence. But beneath these assurances, the stakes are much higher: a single breach can undermine years of trust and damage your program’s reputation.

The Complex Threats Behind Remote Proctoring

Blocking copy-and-paste is easy. Stopping screen captures is table stakes. But candidates intent on cheating have more sophisticated tools at their disposal, and the list is growing. Virtual environments, duplicate input devices, and hidden remote sessions can all slip past providers who only lock down at the surface level.

Many remote proctoring providers are working hard to keep pace with increasingly sophisticated threats, but even well-established solutions can have gaps. These challenges are industry-wide, and that’s why rigorous evaluation is so important.

The Proof: Capability Matrix

This matrix is more than a guide—it’s a reality check. If your provider cannot demonstrate coverage across these capabilities, your program may be at risk. Our remote proctoring solution, ProctorNow™, addresses not only the easy gaps but also the advanced threats that many solutions overlook.

Criteria NumberCriteriaConformanceNotes
1.0Prevent access to unauthorized tools
1.1Display test full screenSupportsLockdown mode; controlled window focus
1.2Block remote desktopSupports
1.3Block virtual machinesSupportsDetects common VM/anti-detect signals
1.4Block applications (process allow/deny)SupportsPolicy-based exceptions
1.5Block printingSupports
1.6Block unauthorized websitesSupportsURL/domain allowlist
2.0Prevent content from being stolen or exposed
2.1Block screen capturesSupportsOS-level and app-level hooks
2.2Clear cut, copy, and paste buffersSupportsDuring and on exit
2.3Clear cache before and after testingSupportsConfigurable
2.4Block man-in-the-middle attacksSupportsTLS pinning & connection hardening
3.0Required features
3.1Block assistive technologies not related to accessibilitySupportsAllows approved AT only
3.2Browser identification via JavaScriptSupportsFingerprint & integrity checks
3.3Block content on additional monitorsSupportsSingle-display enforcement
3.4Block gestures that allow access to contentSupportsOS/hardware gestures
3.5Upload security events (blocked processes, invalid keys)SupportsCentralized telemetry
3.6Automatic software updatesSupportsSilent where permitted
3.7Automatic configuration updates pre-testSupportsPolicy sync at launch
4.0Optional features
4.1Detect virtual video/microphones and duplicate input devicesSupportsAids remote proctoring
4.2Suppress authorization requests for microphones during examSupportsPolicy-controlled
5.0Platforms
5.1Support all major platformsSupportsWindows, macOS; roadmap for others as applicable
5.2Configurable rendering enginesPartially supportsWhere security posture allows
6.0Privacy
6.1Support uninstallSupportsClean removal post-exam
6.2Limit trackingSupportsCollect minimum necessary
6.3Disclosure of all information capturedSupportsPolicy and candidate notice
7.0Accessibility
7.1Compatibility with assistive software for accessibilitySupportsApproved AT via accommodation
Remote Proctoring Capability Matrix

Core Capabilities Every Provider Must Prove

When evaluating providers, don’t stop at “does it lock down the browser?” Press further:

  • Does it detect and block advanced cheating environments like virtual machines and remote desktops?
  • Does it protect data in transit against interception?
  • Does it log and escalate suspicious activity or simply block it silently?
  • Does it strike a balance between accessibility and integrity, allowing only approved assistive technologies?
  • Does it update automatically, keeping defenses ahead of emerging threats?

If the answer is no to any of these, your program may be exposed to risk.

The Bottom Line for Your Program

Choosing a remote proctoring provider is a decision that impacts the integrity of your entire program. Don’t settle for surface-level protection. If you’d like to review the full Remote Proctoring Capability Matrix or discuss how these defenses apply to your program, let’s schedule a technical review of your current defenses.


About the Authors

Ron Lancaster is the Chief Technology Officer with nearly 30 years of experience in product and technology leadership, including 20 years in the assessment industry. With a passion for artificial intelligence and engineering excellence, he is focused on advancing ITS’s AI, cloud, and new product strategies. Ron holds a master’s degree in software engineering from the University of Minnesota and has earned several patents. He has also mentored technology startups through Techstars and the Minnesota Cup. When he isn’t working, you can find Ron spending time with his family, snowboarding in the winter, and cycling all year round.

Chris Glacken is the Director of Innovative Technologies at ITS. Chris has nine years of experience in assessment with over a decade of experience in business and technical system requirements. He’s responsible for the ITS Secure Browsers and developed an in-house ‘white hat’ tool to identify Secure Browser vulnerabilities. He’s also the mastermind behind the ITS remote proctoring technology, ProctorNow™. He earned his bachelor’s degree in information science/studies at Salisbury University, Perdue School of Business. When he’s not pioneering innovative ideas for testing software, you can find him playing Minecraft with his two sons.

Internet Testing SystemsEvaluating Your Remote Proctoring Provider: What’s at Stake

Related Posts

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.