Manage Privileged Users and Shrink Your Attack Surface
Bomgar has always been designed with security at the forefront. Not only is the product architecture superior from a security standpoint, the product itself includes a number of features that strengthen the security of your organization on a day to day basis.
Businesses today must not only meet increasingly stringent company security policies, but many are also subject to industry compliance mandates such as HIPAA or PCI. With Bomgar, security professionals can control and monitor privileged access while also empowering authorized users to perform their duties.
Bomgar offers the greatest number of deployment options, so you can select the choice that corresponds with the security requirements of your business. From on-premises and virtual appliances to the Bomgar Cloud, get the best deployment option for your business.
We provide each customer a segmented, single-tenant environment for all deployment types. Your data is never shared with data from any other customer.
Bomgar works with firewalls without VPN tunneling, keeping your perimeter security intact. Outbound only session traffic uses TCP Port 443 protecting your users and endpoints from external threats. Bomgar's infrastructure has very minimal port exposure, which drastically reduces the potential attack surface.
Bomgar seamlessly integrates with external user directories, such as Active Directory, for simple and secure privileged user management.
With Bomgar, you can leverage your existing directories (LDAPS, Kerberos, Smart Card, RADIUS) so that changes to a user’s account in Active Directory are automatically reflected in Bomgar.
Bomgar lets you associate group policies in Bomgar with existing user groups in your directory, so that if you move a user from one group to another in LDAPS or Azure AD, their permissions in Bomgar are automatically updated to reflect their new role.
And you can leverage existing security investments such as password solutions, information and event management (SIEM) tools, and Change Management solutions to increase productivity.
Granular Access Controls and Permissions
Grant access with even more granularity so that just the right levels of access are granted to those who need it, enforcing the concept of “least privilege” in your organization. Bomgar enables administrators to control which specific functions a privileged insider or vendor can access within Bomgar.
Policies can be set for vendors, users, groups, or sessions, giving administrators significant flexibility and control. Group policies integrate easily with external directory stores to assign permissions based on your existing structures. Session permission policies enable building a security model for each specific session type. Further control access by utilizing approval workflows defining not just who, but when an endpoint is accessed.
Restrict remote access to defined endpoints
Schedule when endpoints can be accessed
Require access notification and authorization
Prevent unauthorized programs from being viewed with application whitelisting
Manage your access control policy with group policies
Native Two-Factor Authentication
Two factor authentication increases the security of remote access by requiring a second factor (one-time passcode) to login, in addition to the password. It’s available for every Bomgar user at no additional cost, and is simple for the administrator to enable for all users. If you are already using a 2FA solution, you can use it with Bomgar too.
Since Bomgar allows privileged users to connect from mobile devices, you can create a list of authenticated devices and determine the network locations from which they can connect.
Bomgar enforces the use of SSL for every connection made to the site. Bomgar encrypts all data in transit using TLSv1, and data at rest encryption can be enabled with your organization’s key management solution. Available cipher suites can be enabled or disabled and reordered as needed to meet the needs of your organization.
Session Audit and Monitoring
Session logging allows for the review of all end system and network interactions. This log includes users involved, which endpoints they connected to, and system information. In addition to log reports, Bomgar also records videos of each session. These video recordings capture every action taken in each remote desktop, SSH, or Telnet session.
Session logging data is available on the appliance in an un-editable format for up to 90 days, but it can be moved to an external database using the Bomgar API or the Bomgar Integration Client for longer term retention. Or you can track session data and configuration changes with your existing SIEM solutions.