Compliance in Action: PCI DSS 3.2 and How Bomgar Can Help You Achieve It

On February 1, 2018 the next version of the PCI Data Security Standard (PCI DSS 3.2) will become a requirement for all organizations that store, process and/or transmit credit cardholder data. That means companies subject to PCI compliance have less than a year to educate themselves on the changes and ensure that they have adopted the new standard. Continue Reading

Avoid Unintentional Risks Through Securing Enterprise Collaboration Apps

In a recent article published in SDTimes, Bomgar’s Sam Elliott weighs in on the emergence of collaboration apps in the enterprise. Already very popular on the consumer side, many organizations are embracing a new genre of solutions to collaborate and consolidate information. These apps have the potential to improve efficiency and agility, but they also present clear security concerns – just not in the manner you likely imagine. Continue Reading

Bomgar Introduces Remote Credential Rotation in Bomgar Vault 17.1

Today, Bomgar announced the latest version of its enterprise password management solution, Bomgar Vault 17.1. This new version is the first to offer remote credential rotation from an on-premise solution with RotateAnywhere technology. RotateAnywhere allows organizations to rotate credentials remote on an Internet-connected network without VPN connectivity or leverage software defined networking (SDN), securing systems regardless of domain trust and connectivity. Continue Reading

Scrap the Sticky Notes and Spreadsheets with Bomgar Credential Injection

Enterprises and SMBs are facing a new reality of hundreds of attempted data breaches against their networks each day. Attackers seek vulnerabilities in a company’s defenses, and a common attack vector for many of these threats can be traced back to remote access tools with weak security features. Continue Reading

Give the Gift of Security

As Valentine’s Day approaches, you may find yourself devising ways to show that special someone in your life how much you care. But what about the vendors and other third parties with whom you do business? They play an essential part in keeping the organization running, and their commitments and contributions deserve recognition. While a box of Russell Stover chocolates is surely always welcome, we have a more appropriate present in mind: the gift of security. Continue Reading

Does Your Company See its (Security) Shadow?

This Thursday, February 2nd, people nationwide—particularly those in colder climates—will eagerly await the prognostication of Punxsutawney Phil to learn if we can expect an early spring. If the legend is to be believed, winter’s remaining length will be determined by whether or not Phil emerges from his hole and sees his shadow. Continue Reading

Five Strategies for Bucking the Data Breach Trends in 2017

Thor Olavsrud with CIO.com recently wrote an article examining the five data breach trends Experian predicts will dominate 2017. With scenarios such as cyber warfare, “domino effect” breaches, and ransomware being used to fund hackers’ research into more sophisticated attacks, the predictions paint a rather dire picture. Continue Reading

Ensuring Security in the IoT Age

In a blog post published last week on IoT Central, Bomgar’s Sam Elliott wrote about the security challenges posed by our connected word. In the not-too-distant past, most companies had a standard, controlled one device per user technology environment. Today, it’s far more common for individuals to have multiple devices connected to systems and applications, and the IoT serves only to complicate this incredibly complex security environment. Continue Reading

Market Shift: Blending of IAM and Remote Support to Improve Security Concerns

According to IDC, support providers are leading a market shift toward blending identity and access management (IAM) with remote support functions to improve the access process and address growing security concerns. Continue Reading

Satisfy Audit and Compliance Requirements. Quickly and Effectively.

Audit and compliance regulations are regularly updated and adapted to match evolving security risks. Large breaches in the last year such as LinkedIn and Yahoo are driving more scrutiny around risk factors, and compliance organizations are tightening up security policies to ensure access to sensitive data is properly regulated and managed. Continue Reading