News Coverage

Remote Solutions Can Help Hotels Bolster Security

— Hotels are increasingly introducing technologies such as mobile booking, standalone check-in kiosks and next-generation CRM platforms in order to interact seamlessly with guests and enhance the customer experience while also improving their own operations. According to Hospitality Technology’s 2014 Customer Engagement Technology Study, 80 percent of hotels plan to have a mobile app by the end of 2015 and 49 percent will focus on developing tablet-based check-in in 2015. According to the report, large brands are leading the way: Marriott has implemented mobile check-in and check-out at 500 hotels and Starwood is piloting the use of smartphones as room keys. Full Story

The franchise security wake-up call

— Recent headlines illustrate that the slew of retail data breaches continue, and are unlikely to abate in the near future. Among the latest news items, the Payment Card Industry Security Standards Council issued a bulletin advising retailers to review security controls to ensure protection against Backoff malware, and Krebs on Security reported a possible Dairy Queen breach at a number of stores in several states. While the latter event has yet to be confirmed, it sheds light on a key security challenge of the franchise model. Full Story

Securing 3rd Party Access

— Donald Rumsfeld provided a famous quote regarding problems of which we are aware: “There are known unknowns. That is to say there are things that we now know we don't know. But there are also unknown unknowns. There are things we do not know we don't know. So … we do the best we can and we pull all this information together.” In IT security, there are constant challenges, such as hackers, insider threats and malware. However, these fall into the bucket of ‘known unknowns,’ in that you should be aware of the general risks and have taken steps to prevent them. Full Story

What’s that Plumber Doing in the Bedroom?

— The increasing sophistication of technology makes it hard for IT professionals to keep up and be experts in all things technology. From monolithic central IT systems through to new and distributed computing models, it’s harder—and often more expensive—to manage and support everything internally. As such, more outsourcing and use of third-party service providers is taking place. An Ovum research study in late 2013 found that 88 per cent of companies surveyed in Western Europe allowed at least one third party access their network remotely. For one of those businesses surveyed, more than 100 outside companies had access to their IT network. Full Story

Remote access and best practice

— A spate of new and updated malware attacks has been uncovered from Backoff, which targets point-of-sale terminals to a new version of Citadel that goes after more traditional PCs and laptops. What links all these attacks is the use of unsecured remote access technologies to gain initial access to the systems. Many IT professionals and third-party vendors rely on remote access tools to do their jobs. These are the tools they use to manage, update and troubleshoot systems at a distance. Full Story

Efficiency and Security Gains Through Remote Access

— The IT environment in today’s financial services industry has become highly distributed, with branch offices and remote workers spread across thousands of miles and systems ranging from servers to mobile devices to kiosks. This can be a tricky environment for any organization to manage, but credit unions often face additional challenges. Unlike their larger counterparts, many of them have limited resources that can only support a small IT staff. Full Story

TECH 21 — Mississippi’s most wanted in technology

— Joel Bomgar’s creation, the Bomgar Box, enables support pros to securely access and control remote computer systems and devices anywhere in the world. At 23, Bomgar founded the company in 2003. Today, it has more than 8,000 customers and annual sales revenue of more than $50 million. Bomgar employs more than 200 people, most in Ridgeland. Full Story

Remote support products meet government security needs

— Bomgar’s appliance-based remote support software enables users to remotely access and fix nearly any IT device that is located just about anywhere. According to Scott Braynard, who is vice president of public sector at Jackson, Miss.-based Bomgar, his firm’s software is built specifically for remote support and offers an extra layer of security to safeguard support sessions. “It is feature-rich for both support desks and service desks,” he says. Full Story

Ensuring Security And Compliance In An Era Of Connected Health

— In the healthcare industry, concerns over protecting sensitive patient data are heightened as organizations introduce more Internet-connected devices and deploy cloud environments to store and manage information. As these devices share more data across networks, IT professionals and medical device designers are faced with the challenge of how to keep this data secure. Full Story

The Top 9 Most Secure Remote PC Access Software of 2014

— Remote access to PCs has long been a tricky IT staple. On the one hand, gaining authorized control to your device and its files is a great thing, allowing for users to have quick access to their most essential electronic items. But on the other hand, this convenience has become a bigger and bigger concern for sophisticated hackers and the infiltration techniques they employ to gain access to your devices. Now, the best remote PC access software isn't just the one with the most features; rather, it's the one that's the most difficult for an unauthorized user to breach. Full Story

Page 3 of 45 pages: 12345 Last
| Senior Director of Public Relations Bomgar Corporation