Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Achieving Security at the Service Desk Without Impacting Productivity

June 26, 2018

  • Blog
  • Archive

Those of us in the security industry are no strangers to the “security paradox” or “productivity versus security”. The primary purpose of an IT service desk is to provide a single point of contact for users to gain assistance in troubleshooting, get answers to questions and solve problems.

The reality is there is a constant struggle in most organizations between IT security and productivity of the business, and in this case the IT service desk.

You’ve probably heard this many times before, but passwords are often the weakest link in the security chain.

Imagine that your web server infrastructure was a fortress that you spent lots of time and resources fortifying. You built high walls, watch towers, retracting bridges, moats, solid iron bars across the windows and so on to keep the bad guys out.

Now imagine that the bad guys happen to have a copy of the key to the front door! I use this analogy to make a serious point: what good is the most locked down web server in the world if the bad guys can exploit weak or shared passwords to bypass all of the external security measures you’ve put in place?

With the release of Bomgar Remote Support 18.2, securing the keys to your fortress are available with the new Bomgar Vault. This allows the service desk to securely store, share and track the use of privileged credentials by the IT service desk.

Bomgar Vault for Remote Support is an on-appliance credential store that enables your technicians to access privileged credentials and inject them directly into an endpoint. Vault is integrated directly with the Remote Support solution so your technicians don’t have to learn to use another tool or even exit Bomgar to retrieve passwords. With just one click of the Key icon, right in the Bomgar Console, users simply select the correct credential from the drop-down list to log into the remote system, without ever having to know or see the actual passwords.

With Bomgar Remote Support and Bomgar Vault, you can:

  1. Improve productivity and time to resolution by streamlining access to shared passwords – no more sticky notes!
  2. Eliminate the need to store and track shared credentials manually
  3. Mask plain text credentials and password from technicians so they cannot be phished or stolen
  4. Eliminate a very common and profitable attack pathway for hackers
  5. Greatly reduce your exposure to Pass the Hash and other password vulnerabilities by using the Bomgar Vault to rotate the AD passwords at an automatic rotation upon password check-in.
  6. Use the built-in Discovery tool to automatically find and protect AD and local credentials.

Want to know more? Start a free 30-day trial in /login to experience the benefits of Vault in your environment.

Learn more about Bomgar Vault

For a quick overview of the new Bomgar Vault, check out this 90-second video!

Eugene Zhang

Sr. Solutions Engineer

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.