The Bomgar Blog

Securing Access First: Start with Vendors

Employees and vendors with remote access to systems and privileged credentials are prime targets for cyberattacks. What's your strategy for securing and protecting those privileged accounts and the access to them?

Continue Reading

Bomgar in the News: No Room for Complacency in Today’s Security Thread Landscape

Since the news of Equifax’s historic data breach broke in September, countless articles have examined the company’s missteps and what could have been done differently to prevent the attack, or at least minimize the damage. Despite the frequency with which these events occur, many companies and individuals alike continue to display a shocking apathy in the face of security threats.

Continue Reading

Securing A Smarter Globalized World

The concept of smart cities has triggered evangelical fervor from planners, engineers and futurists. This concept integrates multiple technological solutions, along with creating a need for a secure environment to manage and control access into a city’s infrastructures.

Continue Reading

Bomgar Offers Azure Deployment for Secure Access Solutions

Cloud migration is a growing trend that many organizations are taking advantage of, helping to reduce costs operational costs while still increasing IT effectiveness and productivity. Today, Bomgar announced the ability to deploy its virtual Remote Support and Privileged Access appliances in Microsoft Azure environments

Continue Reading

Bomgar Insider Spotlight - Sean Choo

Here at Bomgar, we’re committed to building and maintaining the best secure access solutions that money can buy. In addition, we’re focused on making sure our customers get the most out of our their Bomgar products! Today's spotlight is on Sean Choo, Eservice / IT Helpdesk Technician at Toshiba Business Solutions.

Continue Reading

Take full advantage of new web based administration tools without the risks

Microsoft’s recent Project Honolulu announcement introduces a new method of managing Windows Server systems from a centralized HTML5 web application, moving away from the legacy MMC snap-ins. This now makes it much easier than using a command line tool for ad-hoc configuration and troubleshooting tasks that depend more on exploration and investigation rather than scripting and automation.

Continue Reading

The Importance of Protecting Access and Accounts

Employees and vendors with remote access to systems and privileged credentials are prime targets for cyberattacks. Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But this is only half the battle.

Continue Reading

World Wide Wonder: Envisioning Life without the Interwebs

This Sunday, October 29 marks the 12th anniversary of International Internet Day. Designed to commemorate the first remote connection between two computers, achieved on October 29, 1969, International Internet Day is “a chance to celebrate the people who helped build the internet, while also giving us a moment to reflect on all the ways that it has changed our lives forever.”

Continue Reading