{"id":10774,"date":"2012-04-18T07:33:00","date_gmt":"2012-04-18T12:33:00","guid":{"rendered":"http:\/\/devweb.rjrinnovations.com\/vendors-facilitate-security-but-only-you-can-create-it-2\/"},"modified":"2016-10-13T10:20:37","modified_gmt":"2016-10-13T14:20:37","slug":"vendors-facilitate-security-but-only-you-can-create-it-2","status":"publish","type":"post","link":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/","title":{"rendered":"Vendors Facilitate Security &#8212; But Only You Can Create It."},"content":{"rendered":"<p>Of all the product claims made by software vendors, perhaps no claim is so consistently overblown as that of security. Especially when one stops to consider that not a single product out of thousands of security products does anything by itself to ensure security.<\/p>\n<p>But wait, you say, Bomgar is not a security product per se but we do make a lot of claims about our product\u2019s security and how it\u2019s superior to our competitors.<\/p>\n<p>So what do I mean?<\/p>\n<p>Just this: that there is a great deal of difference between facilitating security and creating security. And products can\u2019t create security. They can, at best, facilitate it. It\u2019s up to people to do the securing.<\/p>\n<p>Let me explain: Think about a security measure as simple as a lock. At first glance, this little invention would seem to epitomize security, but it doesn\u2019t. There are actually many different considerations in the usability of the lock that either facilitate or impede security.<\/p>\n<p>Design of the door and frame<br \/>I lived in a former soviet bloc country for a couple of months two years ago. The doors had huge locks that made a satisfying \u201ccha-chunk\u201d whenever you locked them. What\u2019s more, though, the door was built together with the frame so that the steel door was integrated with the steel lock which was integrated with the steel frame, which was built securely into the wall. You would need a jackhammer to get these doors open, not just a swift kick. Our doors in the States usually deadbolt into a flimsy wooden door frame; the lock may be strong, but it\u2019s leaning on something weak. <\/p>\n<p>The Locking Mechanism<br \/>Some locks can be opened by anyone from the inside whereas some require a key:<\/p>\n<p>The latch type is convenient, but if you combine it with an exterior door with glass panes, then all someone has to do is break the glass, reach in and flip the latch to gain entry. But before you scoff at all those non-private-key morons, consider who\u2019s going to be using the lock. If you have kids in the house, then \u201csecurity\u201d may be more broadly defined. If there\u2019s a fire, you don\u2019t want your seven year old to have to find the key before getting out of the house.<\/p>\n<p>Safeguards<br \/>Some doors automatically lock when you close the door behind you. Most hotel rooms function like this for obvious reasons. They don\u2019t want people to forget to lock the door, so they make it impossible to forget. On the flip side, some vehicle locks require you to have the keys in your hand before you can lock the door. In other words, they make it impossible for you to lock yourself out of your car.<\/p>\n<p>It should be clear in these examples that no lock or lock configuration actually creates security. All they do is create the conditions in which security can be achieved. Software products are the same way. They create conditions in which security can be achieved, and the best security products make the conditions such that security is easier to achieve than non-security. Seat belts, rearview mirrors, backup cameras, blind spot sensors, airbags, anti-lock breaks, crumple zones, and dozens of other innovations have helped create conditions for safe driving. However, a \u201csafe\u201d car driven off a cliff is not safe.<\/p>\n<p>The remote support market is no different. Remote support is consistently found to be one of the top attack pathways used in data breaches, and it\u2019s usually the older school point-to-point remote control technologies to blame. To counter this, we\u2019ve tried to build our product to create the conditions in which remote support can be secured (as Joel Bomgar mentioned in a recent post). Specifically:<\/p>\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Architecture<br \/>The Bomgar appliance is deployed within your own network. Data is routed and stored centrally over standard ports, making auditing easier. And keeping the appliance in-house prevents third party tampering, limiting your organization\u2019s circle of liability. This architecture also enables secure support of end users both over the internet and within secure closed networks (e.g. DoD SIPRNet).<\/p>\n<p>Authentication<br \/>Bomgar integrates with your existing identity management and authentication tools (LDAP, Active Directory, RADIUS, Kerberos, etc.), allowing users to login using secure directory credentials or using smart cards (CAC, etc.). Bomgar administrators can apply permissions and password policies on the group or individual level. This makes logging in in a non-secure way harder.<\/p>\n<p>Access Controls<br \/>Support rep permissions can be assigned granularly, enabling administrators to give reps only the privileges they need and no more. And when greater permissions are needed for a particular remote support session, they can be given on a one-off basis by higher-tier reps or administrators. These permissions can be applied to external vendors too. Furthermore, during a Bomgar session, end users have control over the rep\u2019s level of access down to each application viewed and action performed.<\/p>\n<p>Audit<br \/>Bomgar keeps detailed logs of session activity, chat transcripts, transferred files and system information, plus video recordings of each session. In addition, Bomgar can track and log administrative activity, enabling multiple levels of managerial oversight.<\/p>\n<p>It\u2019s not perfect, but Bomgar provides a good framework for securing remote support. We make it easy to do things that are secure, and we make it hard to do things that are not secure. And that\u2019s what all good security products are designed to do.<\/p>\n<p>In contrast, if you look at a lot of the older remote control products, they make it difficult to be secure. For instance:<\/p>\n<p>Architecture<br \/>A lot of older products are point to point. With nothing in the middle to manage how access is accomplished, it\u2019s hard to keep these products in line. Also, since point-to-point products don\u2019t work through firewalls by default, this architecture encourages administrators to port forward through their firewall and create listening ports that are accessible via the internet. One recent study found that there are over 100,000 systems running PC Anywhere that are exposed in this way.<\/p>\n<p>Authentication<br \/>With a lot of the old products, authentication is handled at the client level, meaning that the support rep is logging in with a local password versus a domain password. This encourages the use of shared passwords. Also, many software as a service (SaaS) remote support products don\u2019t integrate with internal directories and offer named-seat licensing (where each license has to be tied to a single person\u2019s name\/account), increasing the motivation to create \u201ctech1, tech2\u201d type user names that undermine auditing.<\/p>\n<p>Access Controls<br \/>With most of the legacy products, once you\u2019re in, you\u2019re in. They have binary access. Either you have full access to everything on the end system or you don\u2019t have access at all. This is like giving your teenager the keys to a Maserati and telling them to not break any speed limits.<\/p>\n<p>Audit<br \/>With many of the old products, audit is non-existent. With nothing in the middle of a point-to-point connection, remote control sessions slip away in the night (or day) without any record that they ever took place. This is very convenient for hackers.<\/p>\n<p>No product (not even the \u201csecurity\u201d products) can create security, but fortunately, you can do a lot in software to facilitate security. You\u2019re still going to have incidents of people driving \u201csafe\u201d software products off a cliff, but with the right controls, we can make it a lot harder.<\/p>\n<p>By Nathan McNeill<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of all the product claims made by software vendors, perhaps no claim is so consistently overblown as that of security. Especially when one stops to consider that not a single product out of thousands of security products does anything by itself to ensure security. But wait, you say, Bomgar is  [&#8230;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[39],"class_list":["post-10774","post","type-post","status-publish","format-standard","hentry","category-partner-news-fr","tag-english-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vendors Facilitate Security - But Only You Can Create It. - RJR Innovations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vendors Facilitate Security - But Only You Can Create It. - RJR Innovations\" \/>\n<meta property=\"og:description\" content=\"Of all the product claims made by software vendors, perhaps no claim is so consistently overblown as that of security. Especially when one stops to consider that not a single product out of thousands of security products does anything by itself to ensure security. But wait, you say, Bomgar is [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RJR Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-18T12:33:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-13T14:20:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RJRInnovations\" \/>\n<meta name=\"twitter:site\" content=\"@RJRInnovations\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/vendors-facilitate-security-but-only-you-can-create-it-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/vendors-facilitate-security-but-only-you-can-create-it-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Vendors Facilitate Security &#8212; But Only You Can Create It.\",\"datePublished\":\"2012-04-18T12:33:00+00:00\",\"dateModified\":\"2016-10-13T14:20:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/vendors-facilitate-security-but-only-you-can-create-it-2\\\/\"},\"wordCount\":1249,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"keywords\":[\"English @fr\"],\"articleSection\":[\"Nouvelles des partenaires\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/vendors-facilitate-security-but-only-you-can-create-it-2\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/vendors-facilitate-security-but-only-you-can-create-it-2\\\/\",\"name\":\"Vendors Facilitate Security - But Only You Can Create It. - RJR Innovations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\"},\"datePublished\":\"2012-04-18T12:33:00+00:00\",\"dateModified\":\"2016-10-13T14:20:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/vendors-facilitate-security-but-only-you-can-create-it-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/vendors-facilitate-security-but-only-you-can-create-it-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/vendors-facilitate-security-but-only-you-can-create-it-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vendors Facilitate Security &#8212; But Only You Can Create It.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"name\":\"RJR Innovations\",\"description\":\"Connect your business... All of IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rjrinnovations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\",\"name\":\"RJR Innovations\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"contentUrl\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"width\":400,\"height\":237,\"caption\":\"RJR Innovations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RJR-Innovations-107107129324171\\\/\",\"https:\\\/\\\/x.com\\\/RJRInnovations\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rjr-innovations\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/RJRInnovations\"]},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vendors Facilitate Security - But Only You Can Create It. - RJR Innovations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Vendors Facilitate Security - But Only You Can Create It. - RJR Innovations","og_description":"Of all the product claims made by software vendors, perhaps no claim is so consistently overblown as that of security. Especially when one stops to consider that not a single product out of thousands of security products does anything by itself to ensure security. But wait, you say, Bomgar is [...]","og_url":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/","og_site_name":"RJR Innovations","article_publisher":"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","article_published_time":"2012-04-18T12:33:00+00:00","article_modified_time":"2016-10-13T14:20:37+00:00","twitter_card":"summary_large_image","twitter_creator":"@RJRInnovations","twitter_site":"@RJRInnovations","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/#article","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/"},"author":{"name":"","@id":""},"headline":"Vendors Facilitate Security &#8212; But Only You Can Create It.","datePublished":"2012-04-18T12:33:00+00:00","dateModified":"2016-10-13T14:20:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/"},"wordCount":1249,"publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"keywords":["English @fr"],"articleSection":["Nouvelles des partenaires"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/","url":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/","name":"Vendors Facilitate Security - But Only You Can Create It. - RJR Innovations","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/#website"},"datePublished":"2012-04-18T12:33:00+00:00","dateModified":"2016-10-13T14:20:37+00:00","breadcrumb":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rjrinnovations.com\/fr\/vendors-facilitate-security-but-only-you-can-create-it-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rjrinnovations.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Vendors Facilitate Security &#8212; But Only You Can Create It."}]},{"@type":"WebSite","@id":"https:\/\/www.rjrinnovations.com\/#website","url":"https:\/\/www.rjrinnovations.com\/","name":"RJR Innovations","description":"Connect your business... All of IT","publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rjrinnovations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rjrinnovations.com\/#organization","name":"RJR Innovations","url":"https:\/\/www.rjrinnovations.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","contentUrl":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","width":400,"height":237,"caption":"RJR Innovations"},"image":{"@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","https:\/\/x.com\/RJRInnovations","https:\/\/www.linkedin.com\/company\/rjr-innovations","https:\/\/www.youtube.com\/user\/RJRInnovations"]},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/comments?post=10774"}],"version-history":[{"count":0,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10774\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/media?parent=10774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/categories?post=10774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/tags?post=10774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}