Securing Remote Devices