Call us on: +44 (0)1364 654100
Privileged Access Management [All Sectors - Subscription Licence (1-Year) (10,000-24,999 ) Per Endpoint - Electronic *Non-Returnable*] boxshot

Add this product to your basket

Privileged Access Management [All Sectors - Subscription Licence (1-Year) (10,000-24,999 ) Per Endpoint - Electronic *Non-Returnable*]

Published By: Bomgar UK Limited

£19.22 (Ex. VAT)

Our Part #: 1194529 | Availability:  delivered via Email | Media: Electronic

System Req.

Bomgar allows you to manage and control privileged access across hybrid environments and platforms. Most organizations are using a mix traditional computing, private and public cloud infrastructure to run their critical systems. Bomgar gives you the ability to centrally secure and audit access across all of these environments.

Bomgar also works to and from every platform your privileged users need, including Windows, Mac, and Linux. Plus, users can leverage desktop-quality access through Android or iOS (iPad, iPhone) apps.

Managing privileged access with Bomgar improves productivity for everyone. It streamlines setup, centralizes auditing and reporting, and allows users to connect from their preferred device.

Capabilities of Bomgar Privileged Access Management

Bomgar Privileged Access Management lets you control access to critical systems without hindering the work privileged users need to perform. You can define how users connect, monitor sessions in real time, and record every session for a detailed audit trail. Highlighted features are below.

Secure Remote Access
Extend remote connection protocols beyond the LAN without compromising security by using a Layer 7 (Application) approach that incorporates much tighter controls than those available with a traditional VPN.

  • Remote Access - Use Bomgar's patented Jump technology or native protocols (RDP, SSH) to view or control remote desktops, servers, and network devices.
  • Jump Shortcuts - Create shortcuts for frequently accessed computers.
  • Command Shell - Access the command line for network troubleshooting, system diagnosis or supporting a network device.
  • Custom Special Actions - Bomgar automatically detects the remote operating system and presents special action shortcuts to users during sessions (e.g. a shortcut to the Control Panel when connected to Windows systems). You can even create your own custom special actions.
  • Multi-Monitor Support - View and switch between all the monitors connected to the remote desktop.
  • Multi-Session Support - Access and control multiple systems simultaneously, so that processes spanning multiple systems can be addressed.
  • Reboot/Auto-Reconnect - Reboot the remote desktop without losing your connection. Reboot into safe mode with networking and request automatic logon credentials at reboot.
  • Remote Screenshot - Capture and save an image of the remote screen.
  • Scripts - Create a library of scripts for automating repetitive tasks.
  • System Information - View the remote system information, including running processes, installed programs, CPU usage, and more.
  • Access Console Scripting - Start a session with a remote computer from an external program.
  • File Transfer - Transfer files between remote computers during remote access sessions using Bomgar's built-in File Transfer.
  • Jump Technology - Bomgar’s patented Jump Technology enables remote access without requiring firewall changes or VPN.
  • Remote Desktop Protocol (RDP) - Integrated Microsoft Remote Desktop Protocol enhances RDP security and works across remote networks without VPN tunnels or open listening ports (TCP 3389).
  • SSH/Telnet - Connect to SSH-enabled or Telnet-enabled network devices and control the command line feature on the remote system.
  • Wake-on-LAN - Power systems on/off remotely with integrated Wake-on-LAN (WOL) support.
  • Mass deployment - Deploy Bomgar Jump Clients to multiple systems at once.

Session Forensics
Monitor and act on sessions in real-time. Review tamper-proof audit trails, including annotated video recordings and detailed logs of screen sharing, file transfer, and shell activity.

  • Session Forensics - Command shell recordings are now included in Session Forensics searches. Successful matches in stored shell recordings automatically take the user to that point in time in the recording.
  • Endpoint Surface Analyzer - Know and control how critical endpoints are accessed throughout your organization. Be aware of the listening network port exposure for systems that you manage. Report and keep a running log of critical endpoint network exposure.
  • Dashboard - Monitor ongoing remote sessions, take over sessions, or transfer them to another user. The Dashboard lets you monitor privileged sessions from your desktop or iPad.
  • Message broadcast - Broadcast a message to all logged-in users.
  • Reports - Generate activity reports for specific users or groups. Reports include details about remote sessions, including system information, IP information, file transfer details and more. The following reports are available: Session Reports; Team Reports; Summary Reports; User Account Reports.
  • Reporting permissions - Define which privileged users can view or generate reports.
  • Session recording videos - Capture videos of each RDP, Command Shell, or Jump session. Videos include annotations identifying who has mouse/keyboard control, and you can pan through videos quickly to find key events.
  • SNMP monitoring - Monitor the Bomgar Appliance using Simple Network Management Protocol (SNMP).
  • Syslog - Send log messages about the Bomgar Appliance to an external syslog server.

Cloud Access Control
Harden your internet-facing cloud resources by closing unnecessary ports. Enable multiple authorized users to access and manage cloud infrastructure powered by AWS, Azure, VMware and other IaaS providers.

  • IaaS Providers - Supports Windows, Redhat, CentOS, and Ubuntu Linux VMs powered by AWS, Azure, VMWare and other IaaS providers.
  • Multi-User Access - Allow multiple authorized users to securely connect and manage cloud infrastructure without revealing root credentials.
  • Reduced Attack Surface - No opening of inbound firewall configurations required. Harden your internet facing cloud resources by closing all unnecessary ports including 22 and still get shell access!
  • Headless Linux Support - Headless Linux configurations supported for on prem data center, public, and private cloud infrastructure

Integrate with SIEM, Change Management, and Multi-Factor Authentication tools for a comprehensive approach to securing privileged access. Out-of-the-box integrations are available for a number of the leading solutions.

  • SIEM - Use the Bomgar API to integrate privileged access with your SIEM solution.
  • Change Management - Integrate Bomgar Privileged Access Management with ServiceNow or other change management solutions.
  • Identity management - Use LDAPS/Active Directory to provision users and groups.
  • RADIUS - Use RADIUS for multi-factor authentication.
  • Kerberos - Use Kerberos for single sign-on.
  • Smart Card Support - Pass smart card credentials to remote computers.

Authorization and Notification
Require access notification and authorization. Define what endpoints users can access, schedule when they can access them, and white/blacklist applications for a comprehensive approach to privileged access.

  • Application Whitelisting/Application Sharing - Only allow specific applications to be viewed by privileged users.
  • Access authorization - Require authorization by a third party before a privileged user can access an endpoint.
  • Inactive Session Timeout - Automatically log users out after the session has been inactive for a given amount of time.
  • Post-session Lock - Automatically lock the remote computer at the end of each session.
  • User Login Schedule - Define when sessions can occur on an individual or group basis.
  • Jump Session Policies - Define which tools are available to privileged users based on the specific endpoint being accessed.
  • Automatic Elevation Service - Automatically elevate privileges on remote Windows computers whenever a session begins.
  • Elevate Customer Client - Manually elevate privileges on remote Windows computers.
  • File Transfer - Define which files and directories can be viewed. Limit file upload or download privileges and prevent users from having full control of the remote file system.
  • Remote Registry Editor - Access the remote registry editor on Windows computers.
  • Restrict End-User Interaction - Prevent end users from controlling the remote mouse and keyboard, or black out the remote screen while a session is occurring.
  • Special Actions - Set permissions on which special actions and custom special actions are available to users.
  • View or Control - Give users remote control or view-only privileges on remote computers.
  • User Device Verification - Require verification for mobile devices prior to allowing them to be used in sessions.
  • Teams - Set permissions for individual users or groups of users. Sync Bomgar with Active Directory or LDAP group policies.

Mobile and Web Consoles
Native mobile apps give users secure access over 3G/WiFi from Android or iOS devices only to allowed endpoints. The Bomgar Privileged Web console enables privileged access without installing software locally.

  • Android Access Console - Access remote computers and servers securely from an approved Android tablet or phone.
  • Apple iOS Access Console - Access remote computers and servers securely from an approved iPad or iPhone.
  • Privileged Web Console - Access to endpoints securely through a web-based access console. The Bomgar Privileged Web console enables privileged access without installing software locally.
  • Desktop Access Console - The Access Console is the desktop application for Bomgar Privileged Access Management. It places remote computers and time-saving tools at your users' fingertips.

Credentials & Keys
Authorize access without exposing credentials to privileged accounts. Store credentials in your password management solution. Then authenticate users or elevate privileges with credential or SSH key injection.

  • Endpoint Credential Managemen - Integrate Bomgar with your password vault to utilize pre-provisioned credentials. Credential management lets you hide authentication details from privileged users even while granting them access to approved endpoints.

Supported Endpoint Platforms

Windows Access Management
Manage and monitor RDP, remote Command Prompt, and Jump sessions on Windows servers and desktops.

System Requirements for Windows Endpoints:
Windows 2000 - Windows 10; Server 2003 - 2012 R2; Windows POSReady 7

Mac Access Management
Manage and monitor remote Command Line and Jump sessions on Mac desktops and servers.

System Requirements for Mac Endpoints:
Mac OS X 10.7 - 10.10

Linux Access Management
Manage and monitor remote Command Line and Jump sessions on desktops and servers running multiple Linux distros (Redhat, Fedora, Suse, Ubuntu).

System Requirements for Linux Endpoints:
Fedora Core 20 - 21; RedHat Enterprise 6 - 7; SLED 11; SLES 10 and 11; Ubuntu 14.04 and 14.10
Note: Bomgar certifies support for multiple specific Linux distributions. And some combinations not specifically certified by Bomgar will nonetheless work.

Network Device Access Management
Manage and monitor SSH and Command Line sessions on routers, switches, and network devices.

System Requirements for Network Devices:
Any SSH-enabled or Telnet-enabled network device.

Manage and monitor SSH and Command Line sessions on routers, switches, and network devices.

System Requirements for Network Devices:
Any SSH-enabled or Telnet-enabled network device.

Supported User Platforms

Desktop Operating Systems
Privileged users can use Windows, Mac, or Linux computers to connect to any endpoint supported by Bomgar. This cross-platform capability allows non-Windows technicians and administrative users to connect from the system they prefer to any other operating system they need. Users are no longer bound to Windows when they need to RDP to a computer.

System Requirements for Users:
Windows 2003 - Windows 8.1; Server 2003 - 2012 R2; Mac OS X 10.7 - 10.10; RedHat Enterprise 6 - 7; SLED 11; SLES 10 and 11; Ubuntu 14.04 and 14.10

Mobile Apps for iOS and Android
With Bomgar, IT administrators and privileged users can connect even when they aren’t at their desks. Bomgar’s native mobile apps for iOS and Android give users desktop quality access from a phone or tablet. You can provision devices and limit access to known networks.

System Requirements for Users:
Apple iOS 7.0+ (iPhone, iPad, iPod Touch); Android 2.3+ (Phone); Android 3.0+ (Tablet)

Shopping Basket
    0 Item(s)

    View and amend your basket
    ISV Royalty Licensing
    Adobe CCFT