Bomgar Blog

by Sam Elliott published

Privileged Access Management is Priority for Mitigating Breaches and Insider Attacks

Last week, Bomgar was featured as a representative vendor in Gartner’s Market Guide for Privileged Access Management (PAM). (We’re offering a complimentary copy of the report, which you can download here.) For the first year, Gartner is referring to the market as “privileged access management” rather than “privileged account management,” indicating the increasing importance of securing and controlling access to sensitive endpoints rather than just managing privileged accounts.

Continue Reading
by Jonas Outlaw published

iOS Screen Sharing - Remote Desktop to Mac OS X and See the iPad/iPhone Screen

How iOS Screen Sharing Works

iOS Screen Sharing is the ability to see the screen of remote iOS 8.0.1+ devices that are connected via USB to a Mac running OS X Yosemite. This new capability offers the most comprehensive, real-time seeing of iPads and iPhones possible to date. With it you can see the screen of the remote device, including the camera, all the apps, and their associated settings. Basically, whatever the user sees, you can see.

Continue Reading
by Boatner Blankenstein published

The Cloud, Without Compromising

Since Bomgar’s inception, it has seen several competitive cloud offerings come and go in the market. During that time we stayed committed to pushing our appliance-based offering to the limit, optimizing productivity and security. This was not a game of give and take but an uncompromising ascent towards both of those goals. That quest will never end, but we finally decided it was time somebody offered secure cloud-based remote access correctly. So, we brought the lessons learned from our years committed to the on-premise Bomgar Box to “the cloud” to prove that our remote support cloud offering could be just as secure.

Continue Reading
by Elizabeth Hulsey published

HackSurfer talks Privileged Access Management with Bomgar’s Sam Elliott

In light of the recent launch of Bomgar Privileged Access Management, HackSurfer’s Matt Lichtfus interviewed our own Sam Elliott about the current state of IT and why organizations must identify and protect privileged user accounts. Along with sharing how Bomgar entered the new market, Sam shared an example of why privileged access management is vitally important to organizations.

Continue Reading
by Elizabeth Hulsey published

School Districts Use Bomgar to Support Schools Countywide

The face of today’s education is constantly changing, as the use of technology in teaching and learning continues to create new educational opportunities and remove boundaries allowing students and teachers to better communicate and collaborate.

Continue Reading
by Kim Richard published

Don Draper Takes a Tech Support Call

As Mad Men comes to a conclusion, it got us thinking about what Don Draper is going to do when it’s all over. We decided to see how he would do as a support representative in case he was thinking about making the transition. We’re not sure he would last too long but feel free to let us know what you think in the comments section.

Continue Reading
by Elizabeth Hulsey published

Security Spotlight: Privileged Access Management

Following our last security spotlight on POS attacks, we wanted to revisit the Verizon 2015 Data Breach Investigations Report and dive into the current privileged access management (PAM) trends. As you may know, it’s a space we’ve been watching keenly for a long time, culminating in the recent release of our own PAM solution. According to the Verizon report, it’s an area everyone should be aware of, as privilege abuse was yet again the top driver of data breaches, accounting for 55% of incidents in 2014.

Continue Reading
by Donald Hasson published

Bomgar Privileged Access Management Solution Enables Higher Productivity, Stronger Security

Last week, Bomgar announced the unveiling of our new Privileged Access Management solution, which enables security professionals to control, monitor, and manage access to critical systems by privileged users. Now organizations can provide administrators, vendors, and business users with the access capabilities they need to be more productive while protecting high value infrastructure, assets, and applications from cyber breaches.

Continue Reading
by Elizabeth Hulsey published

Security Spotlight: POS Attacks

Verizon recently released its 2015 Data Breach Investigations Report, providing its annual snapshot into trends and developments impacting the cyber-security landscape. The study contains a number of interesting findings and examines the nine most common attack pathways in detail, including point-of-sale intrusions.

Continue Reading
by Sophie Brown published

License Pool: Bomgar Tips and Tricks

Check out our latest install of the Tips and Tricks series. This month, Joel Patrick, takes a look at the new License Pool feature that came out in the 15.1 Remote Support Release. The License Pool capability provides more flexible reservation functionality and allows admins to better manage their Bomgar investment.

Continue Reading
Page 2 of 35 pages: 1234 Last