Back to Results
First PageMeta Content
System software / Software / Bomgar / Networking hardware / Computer network security / Computer security / Access control / Remote desktop software / RADIUS / Remote administration software / Computing / Remote desktop


WHITEPAPER FIVE STEPS FOR SECURING THIRD-PARTY VENDOR ACCESS Today’s news is filled with data breach stories that stem from security
Add to Reading List

Document Date: 2014-02-12 12:10:11


Open Document

File Size: 1,74 MB

Share Result on Facebook

Company

Verizon / Bomgar Corporation / SET / Bomgar Inc. / CAPTURE A SECURE AUDIT TRAIL / WebEx / /

Country

United States / United Kingdom / /

/

Facility

RDP Port / /

IndustryTerm

individual point solutions / remote support tools / remote access product / web-based remote access tools / web-based tools / credentials easy access tool / access tool / internal systems / remote access tool / /

Organization

Bomgar’s Embassy / Creating Embassy / /

Person

STEPHEN HAY / MIKE CASTILLO / /

/

Position

MANAGER OF TECHNOLOGY INFRASTRUCTURE & SECUIRTY / technician / DIRECTOR OF NETWORK INFRASTRUCTURE EAT’N PARK HOSPITALITY GROUP / /

Technology

Secure Third-Party Vendor Access technology / VPN / direct Remote Desktop Protocol / /

URL

www.trustwave.com / www.bomgar.com/solutions/business-needs/vendor-access / www.verizonenterprise.com/DBIR/2013 / /

SocialTag