Remote access and control technologies can have a powerful influence on productivity and efficiency, but they can also have a potentially destructive impact.
In it’s 2008 Data Breach Investigations Report, the Verizon Business Risk Team named “remote access and control” the most common attack pathway used by hackers: “In over 40 percent of the breaches investigated during this study, an attacker gained unauthorized access to the victim via one of the many types of remote access and control software.”
Given the hacker climate we live in today, I thought I'd start a series about "What Makes Bomgar Secure?"
First, it is important to know that Bomgar has been successfully audited for security by Symantec Corporation, and has taken a number of measures to ensure the security of the data transferred during support sessions. Next, this IS the first of many blog entries regarding how Bomgar supports security. This first one outlines the major areas that supports Bomgar being a secure, remote access and control technology.
Architecture: Encrypting data is not enough. A remote access and control system must give support organizations control over sensitive data and visibility into remote support activity. Bomgar’s appliance-based achitecture unifies support activity and collects all the data around support in a central repository.
Authentication: Support reps should pass through multiple authentication layers or directory authentication before being given access to or control of a remote system. Bomgar gives administrators complete control over how individuals, teams, and even customers are authenticated without slowing down support.
Access: Access should be tiered and permission-based at every level. Bomgar focuses on each end of the support session, offering granular user management to administrators and reassuring controls to customers.
Audit: According to IDG, 67% of CIOs are unable “to ensure all remote interactions meet security and compliance requirements.” Bomgar’s robust logging and recording capabilities capture exhaustive details about support sessions and give administrators critical visibility into support activity.
“In over 40 percent of the breaches investigated during this study, an attacker gained unauthorized access to the victim via one of the many types of remote access and control software.” 2008 DATA BREACH INVESTIGATIONS REPORT