{"id":10580,"date":"2011-05-18T10:45:00","date_gmt":"2011-05-18T15:45:00","guid":{"rendered":"http:\/\/devweb.rjrinnovations.com\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/"},"modified":"2016-10-13T10:21:36","modified_gmt":"2016-10-13T14:21:36","slug":"bomgar-and-the-verizon-data-breach-report-an-assessment-2","status":"publish","type":"post","link":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/","title":{"rendered":"Bomgar And The Verizon Data Breach Report: An Assessment"},"content":{"rendered":"<div style=\"text-align: justify;\"><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">Verizon has released its annual<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><a href=\"http:\/\/www.verizonbusiness.com\/resources\/reports\/rp_data-breach-investigations-report-2011_en_xg.pdf\" style=\"font-weight: bold; text-decoration: underline;\"><span style=\"color: white;\">Data Breach Investigations Report<\/span><\/a><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">, and Bomgar is happy to announce, \u201cWe\u2019re not in it.\u201d So, why would Bomgar be pleased about being omitted? Verizon reports that unsecure remote access and control was the #1 attack pathway used in 2010 (page 35) in the hacking category \u2013 a whopping 71% of the time \u2013 and specifically calls out several remote support vendors, such as RDP, PCAnywhere, Go2Assist, LogMeIn and Netviewer, as security risks. Why? Because these named products have special vulnerabilities to which Bomgar is not subject.<\/span><\/span><\/div>\n<p><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Bomgar was architected to be a secure enterprise-class remote support solution.\u00a0 Its roots lie in the support of security-conscious customers, not the consumer market.\u00a0 Because of the initial design objectives, Bomgar is not subject to the same security vulnerabilities inherent in the remote control solutions that Verizon identified as risky.\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Let\u2019s examine the special architectural considerations that make Bomgar secure and also take note of the interplay between individual features that, in combination, heighten security beyond each feature individually.\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><strong><span style=\"color: white;\">Appliance Ownership<\/span><\/strong><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Bomgar is delivered as an appliance-based solution.\u00a0 The data is always under the control and ownership of the customer.\u00a0 No third-parties ever have access to remote support session data in any form.\u00a0 This is a significant benefit for customers that must, for example, conform to the requirements of the Payment Card Industry (PCI) Data Security Standard (DSS), appendix A, which holds the customer responsible for payment card data even when third-party outsourced solutions are used.\u00a0 The customer is liable for any data breach even if the breach occurs at the outsourcer.\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Appliance ownership has additional benefits which will become apparent below. \u00a0<\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><strong><span style=\"color: white;\">Concurrent Licensing<\/span><\/strong><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Bomgar is licensed through a concurrent license model based on the number of active service desk technicians.\u00a0 This is in contrast to the named-seat model used by the products identified in the Verizon report.\u00a0 With Bomgar\u2019s concurrent licensing, it doesn\u2019t matter how many service desk technicians are<\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><em><span style=\"color: white;\">authorized<\/span><\/em><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">to use Bomgar; all that matters is how many log in at<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><em><span style=\"color: white;\">any<\/span><\/em><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><em><span style=\"color: white;\">one<\/span><\/em><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><em><span style=\"color: white;\">time<\/span><\/em><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">.\u00a0 Thousands of technicians may be authorized to use Bomgar but if only 100 log in at any given time then the customer needs to purchase only 100 licenses.\u00a0 Beyond having significant cost savings for customers delivering 24 x 7 service, the concurrent model has a security aspect that isn\u2019t necessarily obvious.\u00a0<\/span><\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">The named-seat licensing model essentially encourages the use of shared credentials.\u00a0 With the named-seat method, it is very common to see remote control login identities such as \u201cTech001,\u201d \u201cTech002\u201d and so on.\u00a0 When a service technician needs remote control, that technician simply uses an available credential.\u00a0 This has two liabilities.\u00a0 First, accountability is lost between the actions undertaken in the support session and the specific individual technician.\u00a0 Second, passwords associated with the shared credentials are rarely updated, which produces an enormous vulnerability as individuals change responsibilities within an organization (promotions, etc.) or leave the company.\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">With Bomgar, technicians authenticate to Bomgar with their own unique credential.\u00a0 There is never any need or financial motivation to share a Bomgar credential.\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><strong><span style=\"color: white;\">Enterprise Directory Authentication\u00a0<\/span><\/strong><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Coupled very closely with the concurrent licensing model is the ability for Bomgar to provide technician authentication through an enterprise directory such as Microsoft Active Directory.\u00a0 Enterprise directory authentication provides two main benefits.\u00a0 First, the technicians authenticate to Bomgar using the same credential they use to login to their workstations.\u00a0 They are not required to remember a separate credential.\u00a0 Second, with enterprise directory authentication there is no added burden of credential management.\u00a0 The authentication to Bomgar is managed as a by-product of normal enterprise directory activities.\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Additionally, technician privileges within Bomgar are also managed through group membership within the enterprise directory.\u00a0 So, for example, if a service desk technician is promoted from first-level support to second-level support, the change in the directory security group would automatically change their privileges within Bomgar.\u00a0 Similarly, if the technician leaves the support team altogether the change in security group would automatically remove their ability to access Bomgar.\u00a0 Finally, and most importantly, when an individual leaves a company their enterprise directory credential would be disabled as part of the exit process.\u00a0 Disabling the credential immediately removes their ability to access Bomgar.\u00a0 Contrast this process with the named-seat model that has manual administrative overhead activities associated with technician credential management.\u00a0 Incidentally, failure to remove named-seat access for former employees is a major attack vector.\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><strong><span style=\"color: white;\">Directory Port Access<\/span><\/strong><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Another subtle advantage to appliance ownership is that enterprise directory integration is possible without requiring a company to open outside access to their domain controllers.\u00a0 Since the Bomgar appliance resides within an enterprise\u2019s own network infrastructure the risk associated with opening ports to outside entities is removed.\u00a0 Further, Bomgar offers additional capabilities such that it is not even necessary to open an inbound port to the directory when the Bomgar appliance is positioned in a company\u2019s network DMZ. \u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">While this is a subtle aspect, it\u2019s actually a huge benefit.\u00a0 Very, very, few organizations are willing to expose their enterprise directories to outside entities.\u00a0 With other remote support products, that eliminates the possibility of service technician authentication with the centrally controlled and managed directory and thus exposes the other weakness detailed above.\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><strong><span style=\"color: white;\">Outbound Client Network Connections<\/span><\/strong><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">There are multiple ways to initiate a Bomgar session but regardless of how the session is initiated, the remote control connection is<\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><em><span style=\"color: white;\">always<\/span><\/em><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">an outbound connection<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><em><span style=\"color: white;\">\u00a0from the client<\/span><\/em><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">to the Bomgar appliance.\u00a0 In contrast to some of the products named in the Verizon report, with Bomgar, a remote control connection is not maintained through an open listening port on the client computer.\u00a0 Open listening services on Internet-connected computers are a major source of compromise.\u00a0<\/span><\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Data in the outbound client connections to the Bomgar appliance are encrypted using the public key portion of the SSL certificate of the Bomgar appliance.\u00a0 This means that<\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><em><span style=\"color: white;\">only<\/span><\/em><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">\u00a0<\/span><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><span style=\"color: white;\">the Bomgar appliance can decrypt the data.\u00a0 Thus, the Bomgar client connection is essentially immune to any type of man-in-the-middle (MITM) attack.\u00a0<\/span><\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Additionally, all client connections\u2014whether that of the remote computer receiving support or from the service technician providing the support\u2014terminate at the Bomgar appliance.\u00a0 There is no peer-to-peer connection exposure to allow the service technician to establish a direct unsupervised, unaudited, connection to a remote customer.\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><strong><span style=\"color: white;\">Multifactor Authentication<\/span><\/strong><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">Bomgar supports multifactor authentication of service technicians usually in the form of (but not limited to) hardware tokens such as RSA SecureID.\u00a0 Physical factor authentication adds a substantial barrier to impersonation for customers requiring the highest levels of security.\u00a0 The PCI DSS also specifies multifactor authentication as a requirement. \u00a0\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">\u00a0<\/span><\/div>\n<p><\/span><span style=\"font-family: Arial, Verdana, Geneva, Helvetica, sans-serif; font-size: 12px; line-height: 16px;\"><\/p>\n<div style=\"text-align: justify;\"><span style=\"color: white;\">With Bomgar, multifactor authentication layers in on top of all the security aspects of enterprise directory authentication &#038; authorization mentioned above.\u00a0 Additionally, just like domain controller access, appliance ownership removes any risk associated with exposing the multifactor authentication service to outside entities.\u00a0<\/span><\/div>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Verizon has released its annual\u00a0Data Breach Investigations Report, and Bomgar is happy to announce, \u201cWe\u2019re not in it.\u201d So, why would Bomgar be pleased about being omitted? Verizon reports that unsecure remote access and control was the #1 attack pathway used in 2010 (page 35) in the hacking category \u2013  [&#8230;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[39],"class_list":["post-10580","post","type-post","status-publish","format-standard","hentry","category-blog","tag-english-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bomgar And The Verizon Data Breach Report: An Assessment - RJR Innovations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bomgar And The Verizon Data Breach Report: An Assessment - RJR Innovations\" \/>\n<meta property=\"og:description\" content=\"Verizon has released its annual\u00a0Data Breach Investigations Report, and Bomgar is happy to announce, \u201cWe\u2019re not in it.\u201d So, why would Bomgar be pleased about being omitted? Verizon reports that unsecure remote access and control was the #1 attack pathway used in 2010 (page 35) in the hacking category \u2013 [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RJR Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/\" \/>\n<meta property=\"article:published_time\" content=\"2011-05-18T15:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-13T14:21:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RJRInnovations\" \/>\n<meta name=\"twitter:site\" content=\"@RJRInnovations\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Bomgar And The Verizon Data Breach Report: An Assessment\",\"datePublished\":\"2011-05-18T15:45:00+00:00\",\"dateModified\":\"2016-10-13T14:21:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\\\/\"},\"wordCount\":1140,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"keywords\":[\"English @fr\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\\\/\",\"name\":\"Bomgar And The Verizon Data Breach Report: An Assessment - RJR Innovations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\"},\"datePublished\":\"2011-05-18T15:45:00+00:00\",\"dateModified\":\"2016-10-13T14:21:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bomgar And The Verizon Data Breach Report: An Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"name\":\"RJR Innovations\",\"description\":\"Connect your business... All of IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rjrinnovations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\",\"name\":\"RJR Innovations\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"contentUrl\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"width\":400,\"height\":237,\"caption\":\"RJR Innovations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RJR-Innovations-107107129324171\\\/\",\"https:\\\/\\\/x.com\\\/RJRInnovations\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rjr-innovations\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/RJRInnovations\"]},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bomgar And The Verizon Data Breach Report: An Assessment - RJR Innovations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Bomgar And The Verizon Data Breach Report: An Assessment - RJR Innovations","og_description":"Verizon has released its annual\u00a0Data Breach Investigations Report, and Bomgar is happy to announce, \u201cWe\u2019re not in it.\u201d So, why would Bomgar be pleased about being omitted? Verizon reports that unsecure remote access and control was the #1 attack pathway used in 2010 (page 35) in the hacking category \u2013 [...]","og_url":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/","og_site_name":"RJR Innovations","article_publisher":"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","article_published_time":"2011-05-18T15:45:00+00:00","article_modified_time":"2016-10-13T14:21:36+00:00","twitter_card":"summary_large_image","twitter_creator":"@RJRInnovations","twitter_site":"@RJRInnovations","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/#article","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/"},"author":{"name":"","@id":""},"headline":"Bomgar And The Verizon Data Breach Report: An Assessment","datePublished":"2011-05-18T15:45:00+00:00","dateModified":"2016-10-13T14:21:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/"},"wordCount":1140,"publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"keywords":["English @fr"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/","url":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/","name":"Bomgar And The Verizon Data Breach Report: An Assessment - RJR Innovations","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/#website"},"datePublished":"2011-05-18T15:45:00+00:00","dateModified":"2016-10-13T14:21:36+00:00","breadcrumb":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rjrinnovations.com\/fr\/bomgar-and-the-verizon-data-breach-report-an-assessment-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rjrinnovations.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Bomgar And The Verizon Data Breach Report: An Assessment"}]},{"@type":"WebSite","@id":"https:\/\/www.rjrinnovations.com\/#website","url":"https:\/\/www.rjrinnovations.com\/","name":"RJR Innovations","description":"Connect your business... All of IT","publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rjrinnovations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rjrinnovations.com\/#organization","name":"RJR Innovations","url":"https:\/\/www.rjrinnovations.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","contentUrl":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","width":400,"height":237,"caption":"RJR Innovations"},"image":{"@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","https:\/\/x.com\/RJRInnovations","https:\/\/www.linkedin.com\/company\/rjr-innovations","https:\/\/www.youtube.com\/user\/RJRInnovations"]},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/comments?post=10580"}],"version-history":[{"count":0,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10580\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/media?parent=10580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/categories?post=10580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/tags?post=10580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}