BOMGAR REMOTE SUPPORT Karl Lankford

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Privileged Account Management Jason Fehrenbach, Product Manager.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Single Identity – Multiple services how do I stay compliant? Wade Tongen NA Commercial SE.
THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services UGA Bomgar Contact: Marcus Henderson.
Netop Remote Control Trusted. Secure. Experienced.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Dell Connected Security Solutions Simplify & unify.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Solutions Road Show – 13 December 2013 | India Alok Agrawal Practice Lead – UC & C Communication and Collaboration.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Remote Support.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
User and Device Management
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Bomgar Secure Remote Access OARNET Presentation.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
© 2015 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. About this Presentation  How to use this deck:  This is the Global Channel.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Market Intelligence You Can Act On Secure Remote Support for CJIS Compliance December 11, 2014.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Reduce Risk Across Hybrid IT
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
Stopping Attacks Before They Stop Business
CLOUD MANAGED VIDEO SURVEILLANCE
Reduce Risk Across Hybrid IT
Six Steps to Secure Access for Privileged Insiders and Vendors
People-Centric Management
Enterprise Security in Practice
SaaS Application Deep Dive
Six Steps to Secure Access for Privileged Insiders and Vendors
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
Reduce Risk Across Hybrid IT
Secure & Unified Identity
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
PRIVILEGED ACCOUNT ABUSE
Offices: DC, London, Sydney
Access and Information Protection Product Overview October 2013
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Protecting your data with Azure AD
System Center Marketing
IT Management, Simplified
IT Management, Simplified
Microsoft Virtual Academy
Presentation transcript:

BOMGAR REMOTE SUPPORT Karl Lankford ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

About Bomgar Trusted by more than 14,000 Companies The fastest, most secure way for experts to access and support the people that need them. Trusted by more than 14,000 Companies 15 year history of innovation 300+ Employees across US, EMEA, & APAC Leader in secure remote support and access management #1 in Enterprise Remote Support, according to IDC

Bomgar Privileged Access SERVICE DESK CUSTOMER SUPPORT Access, control, & troubleshoot remote desktops, servers, and mobile devices, no matter the operating system or network location Chat, co-browse, and provide remote assistance for your customers. Even support iPad, iPhone or Android apps Bomgar Remote Support Bomgar Privileged Access PRIVILEGED ACCESS VENDOR ACCESS Manage, empower, and audit internal privileged users to securely access your sensitive and critical systems Control, monitor and manage third-party and vendor access to your corporate network and devices

DEPLOYMENT & ARCHITECTURE Why do our customers buy Bomgar? INTEGRATION CONSOLIDATION SERVICE LEVELS DEPLOYMENT & ARCHITECTURE IDENTITY MANAGEMENT FEATURES Consolidation: Support Multiple Platforms Support Mobile Devices On or Off Network Avoid cost and maintenance of multiple tools Includes chat-based and remote camera sharing support Service Levels: Easy Session Initiation Mobile and web-based support Increased First Call Resolution Collaboration and Escalation Ease of use and reliability increase CSAT Integration: Streamline processes for better efficiency ITSM/CRM System Ticketing Systems Security Providers Inventory Systems Knowledge Management Systems Deployment/Architecture: On-premise Physical or Virtual Appliance Bomgar Secure Cloud Firewall friendly “outbound” connections Features: Set granular, role-based permissions Record and monitor session activity Easily export data for an audit or in-depth monitoring Centralized Management Identity Management: Credential injection Two factor authentication- basic and enhanced Integration with Active Directory and SAML ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

Over 85% of respondents saw an increase in FCR of more than 10% with 1/3 reporting and increase of more than 25% 85% were able to increase Customer Satisfaction by more than 10% with 43% reporting a increase of 20% or more. 3 out of 4 respondents had an increase of agent productivity of more than 20% 3 out of 4 companies reported that agents were “Very Satisfied” with Bomgar More than 70% were able to reduce incident handling time by at least 10% CUSTOMER RESULTS ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

iOS Screen Sharing Now Available with Bomgar and iOS 11 View video at: https://www.bomgar.com/blog/entry/ios-screen-sharing-available Ios video. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

BOMGAR PRIVILEGED ACCESS Karl Lankford

Secure Access For… INSIDERS Insider Access INSIDERS Third-Party Vendor Access Give administrators the access to the systems they need without harming productivity. Insider misuse cases are the most likely to take Months or years to discover.. 2016 VERIZON DATA BREAK INVESTIGATION Audit and Compliance

Secure Access For… THIRD-PARTY VENDORS Insider Access THIRD-PARTY VENDORS Third-Party Vendor Access Grant contractors and vendors privileged access to critical assets without giving them a VPN. On average, 89 vendors per week have access to company networks. VENDOR VULNERABILITY INDEX 2016 Audit and Compliance

Secure Access For… AUDIT AND COMPLIANCE Insider Access AUDIT AND COMPLIANCE Third-Party Vendor Access Set granular permissions and record activity for privileged accounts to ease audit and compliance. 50% list cyber risk among the top three challenges for Compliance over the next 12 months. ACCENTURE’S 2016 COMPLIANCE RISK STUDY Audit and Compliance

Bomgar Privileged Access PROTECT THE ACCESS Enable role-based access to specific systems and define session parameters, such as access timeframes, required approvals, and permitted functions. MANAGE ACTIVITY Actively manage the ongoing operational use of network devices and hardware on the network. ANALYZE & AUDIT DATA Understand what privileged users are actually doing within the network and audit for misuse, while meeting audit trail requirements.

Bomgar Vault Secure Password Storage Store passwords securely Uncover potentially non- compliant credentials in your network Automatically rotate credentials