Bomgar Blog

by Elizabeth Hulsey published

School Districts Use Bomgar to Support Schools Countywide

The face of today’s education is constantly changing, as the use of technology in teaching and learning continues to create new educational opportunities and remove boundaries allowing students and teachers to better communicate and collaborate.

Continue Reading
by Kim Richard published

Don Draper Takes a Tech Support Call

As Mad Men comes to a conclusion, it got us thinking about what Don Draper is going to do when it’s all over. We decided to see how he would do as a support representative in case he was thinking about making the transition. We’re not sure he would last too long but feel free to let us know what you think in the comments section.

Continue Reading
by Elizabeth Hulsey published

Security Spotlight: Privileged Access Management

Following our last security spotlight on POS attacks, we wanted to revisit the Verizon 2015 Data Breach Investigations Report and dive into the current privileged access management (PAM) trends. As you may know, it’s a space we’ve been watching keenly for a long time, culminating in the recent release of our own PAM solution. According to the Verizon report, it’s an area everyone should be aware of, as privilege abuse was yet again the top driver of data breaches, accounting for 55% of incidents in 2014.

Continue Reading
by Donald Hasson published

Bomgar Privileged Access Management Solution Enables Higher Productivity, Stronger Security

Last week, Bomgar announced the unveiling of our new Privileged Access Management solution, which enables security professionals to control, monitor, and manage access to critical systems by privileged users. Now organizations can provide administrators, vendors, and business users with the access capabilities they need to be more productive while protecting high value infrastructure, assets, and applications from cyber breaches.

Continue Reading
by Elizabeth Hulsey published

Security Spotlight: POS Attacks

Verizon recently released its 2015 Data Breach Investigations Report, providing its annual snapshot into trends and developments impacting the cyber-security landscape. The study contains a number of interesting findings and examines the nine most common attack pathways in detail, including point-of-sale intrusions.

Continue Reading
by Sophie Brown published

License Pool: Bomgar Tips and Tricks

Check out our latest install of the Tips and Tricks series. This month, Joel Patrick, takes a look at the new License Pool feature that came out in the 15.1 Remote Support Release. The License Pool capability provides more flexible reservation functionality and allows admins to better manage their Bomgar investment.

Continue Reading
by Elizabeth Hulsey published

Bomgar Launches New Privileged Access Management and Remote Support Solutions

Today Bomgar is excited to introduce new solutions to help you better manage secure access, while also enhancing the performance and productivity of your support and security professionals.

Continue Reading
by Elizabeth Hulsey published

United Telcom Supports Geographically Dispersed Subscriber Base with Bomgar

United Telcom first organized under the name United Telephone Association in 1951 by a group of farmers who wanted telephone service in the rural area surrounding Dodge City when Southwestern Bell indicated no interest in providing service to the area. Growing in service area and offerings for more than 60 years, today the company has approximately 100 employees dedicated to providing a wide range of internet, cable and phone services to subscribers throughout southwestern Kansas. Now using Bomgar, United Telcom efficiently supports approximately 5,000 users in a 250 by 100 mile area in southwestern Kansas.

Continue Reading
by Elizabeth Hulsey published

Spring Cleaning: Privileged Accounts

It’s finally that time of year again. Another Bomgar March Madness is in the books and spring is in the air, but of course with that comes spring-cleaning. For IT execs, that can take on many forms but one area that is often neglected is privileged account access. In BeyondTrust’s latest survey, 47% of respondents reported that users in their organizations possess elevated privileges not necessary for their roles. This represents a massive vulnerability to insider threats as well as unnecessary exposure in the event of lost or stolen credentials. As such, it’s critical that organizations shore up privileged access and as they say, there’s no time like the present.

Continue Reading
by Elizabeth Hulsey published

Payment Security is Still a Struggle

Earlier this month, Verizon published its 2015 PCI Compliance Report, which offers insight into the state of compliance and controls around payment card data security. The number of security incidents continues to be on the rise, indicating that many organizations’ compliance efforts aren’t slowing down attacks.

Continue Reading
Page 2 of 35 pages: 1234 Last