©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Bomgar Secure Remote Access OARNET Presentation.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
BalaBit Shell Control Box
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Privileged Account Management Jason Fehrenbach, Product Manager.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
Confidential FullArmor Corp Platform for SaaS and mobile apps to remotely access, migrate, and sync Active Directory resources with the cloud ADanywhere.
THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services UGA Bomgar Contact: Marcus Henderson.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Course 201 – Administration, Content Inspection and SSL VPN
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
DSView 4 Management Software
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Remote Support.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Building a Fully Trusted Authentication Environment
With xTV, Quickly Build Your Enterprise.TV Network, a Single-Destination, Real-Time Stream of Information to Inform Customers, Employees, Partners & Investors.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Gain High Availability Performance and Scale of Applications Running on Windows Azure with KEMP Technologies’ Virtual LoadMaster COMPANY PROFILE: KEMP.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Market Intelligence You Can Act On Secure Remote Support for CJIS Compliance December 11, 2014.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Reduce Risk Across Hybrid IT
Barracuda SSL VPN 2012.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
AuraPortal Cloud Helps Empower Organizations to Organize and Control Their Business Processes via Applications on the Microsoft Azure Cloud Platform MICROSOFT.
Reduce Risk Across Hybrid IT
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Reduce Risk Across Hybrid IT
BOMGAR REMOTE SUPPORT Karl Lankford
Tailor slide to customer industry/pain points
Company Overview & Strategy
IT Management, Simplified
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
The Only Digital Asset Management System on Microsoft Azure, MediaValet Is Uniquely Equipped to Meet Any Company’s Needs MICROSOFT AZURE ISV PROFILE: MEDIAVALET.
Check Point Connectra NGX R60
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Increase productivity
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Virtual Academy
Microsoft Data Insights Summit
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Bomgar Secure Remote Access OARNET Presentation

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2 Founded in Employees 10,000+ customers in 65+ countries Global offices in US, EMEA & APAC Recognized in the Inc. 500/5000 as “America’s Fastest Growing Private Companies” for 6 years running ABOUT BOMGAR

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3 LOYAL CUSTOMERS 10,000+ companies around the world trust Bomgar

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4 OHIO CUSTOMERS

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5 BGSU has standardized on Bomgar across the university system Central IT handles chat sessions/day through Bomgar HR uses Bomgar chat to offer secure assistance to end users Purchasing and Marketing leverage Bomgar to securely access systems in the dept. BGSU deployed active jump clients to securely manage all lab machines Branded Bomgar to have the look and feel of BGSU---leveraged Bomgar API to deploy Bomgar landing page on the BGSU home page Integrating Bomgar with Team Dynamix (ticketing) to centralize IT operations, ensure data integrity and drive KPI metrics such as first call resolution, CSAT and agent utilization Bowling Green University Use Case

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6 -Emergency Management Agency (EMA) utilizes Bomgar to securely access central command center -Leads and DPS leverage Bomgar to securely support laptops in patrol cars -Bomgar’s security architecture allows DPS to meet CJIS, FERPA, and PCI Compliance standards -All remote access data stays with DPS’s 4 walls -End to end reporting of all sessions, including session recording -AD integration to ensure there is tech accountability for remote sessions -Granular permission rights tied to specific users -I.e Level 1 support is not accessing systems outside of their scope of duties Ohio DPS Use Case

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7 STATES THAT HAVE STANDARDIZED ON BOMGAR Colorado Delaware North Carolina Minnesota Missouri Utah Washington

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8 SERVICE DESK CUSTOMER SUPPORT PRIVILEGED ACCESS VENDOR ACCESS BOMGAR SOLUTION PORTFOLIOS Secure Access Platform PHYSICAL APPLIANCEVIRTUAL APPLIANCE SECURE CLOUD BOMGAR Remote Support BOMGAR Privileged Access Management

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9

10 BOMGAR ENTERPRISE REMOTE SUPPORT FEATURES CONSOLIDATION INTEGRATION SERVICE LEVELSSECURITY

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11 BOMGAR ENTERPRISE REMOTE SUPPORT FEATURES CONSOLIDATION Support Multiple Platforms Support Mobile Devices On or Off Network All with Bomgar Why Consolidate? Technician and customer confusion Cost and maintenance of multiple tools Most Point-to-Point tools offer little or no logging Too many places to go look for problems

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12 BOMGAR ENTERPRISE REMOTE SUPPORT FEATURES SERVICE LEVELS Bomgar chat is designed for the technical support call center. Integrate chat with your website, portal, or mobile app Route inbound calls to the right team Manage canned messages & responses. Easily elevate to full remote control with one easy click. Increased First Call Resolution Collaboration and Escalation Easy Session Initiation Chat-based Support Improve your Service Desk’s most important Metrics First Call Resolution Incident Handling Time Customer Satisfaction

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13 SERVICE LEVEL RESULTS SERVICE LEVELS Increased First Call Resolution Collaboration and Escalation Easy Session Initiation Chat-based Support More than one third of customers saw an increase of 25% or more in First Call Resolution More than 43% of respondents had an increase in customer satisfaction of 20% or more

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14 BOMGAR ENTERPRISE REMOTE SUPPORT FEATURES INTEGRATION ITSM/CRM System Ticketing Systems Security Providers Inventory Systems Why Integrate? Launch a remote support session directly from an incident within your ticketing system, and automatically update tickets with details from the support session

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15 BOMGAR ENTERPRISE REMOTE SUPPORT FEATURES SECURITY Single Tenant – No shared software Your Identity Your DNS Name SSL Certificate Customized Graphics Centralized management, authentication and reporting The Appliance Centralized Management Centralized Reporting Multiple Deployment Options

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16 DEPLOYMENT: ON-PREMISES IN THE DMZ

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17 DEPLOYMENT: SECURE CLOUD

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18 DEPLOYMENT: ON-PREMISES ON LAN/WAN

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19 SERVICE DESK CUSTOMER SUPPORT PRIVILEGED ACCESS VENDOR ACCESS BOMGAR SOLUTION PORTFOLIOS Secure Access Platform PHYSICAL APPLIANCEVIRTUAL APPLIANCE SECURE CLOUD BOMGAR Remote Support BOMGAR Privileged Access Management

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21 PRIVILEGED ACCESS MANAGEMENT (PAM) (Gartner definition) PAM Shared account password management (SAPM) Privileged session management (PSM) Superuser privilege management (SUPM) Application-to- application password management (AAPM) Privileged Access Management technologies help organizations shrink the attack surface on critical assets and meet compliance requirements by securing, managing, and monitoring access to sensitive systems. Subset of the Identity & Access Management (IAM) Space

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22 WHY is there interest in PAM technology? Risk associated with both, insiders (employees, contractors, 3 rd party partners)/ outsiders (ex-employees, ex-contractors, HACKERS) Regulation and failed audits, as auditors are paying more attention to Privileged “Accounts” and trail of evidence of Privileged “Access” The existence and proliferation of malware that specifically targets privileged user accounts Vulnerability in legacy protocols (VPN, RDP, SSH, Telnet, VNC, etc) Balance of productivity and security

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23 BOMGAR CAPABILITIES SECURE REMOTE ACCESS Extend remote connection protocols, such as RDP, command shell, SSH, and Telnet, beyond the LAN without compromising security. Connections are secured by the highest level of encryption. MONITOR & AUDIT Monitor sessions in real-time. Review tamper-proof audit trails, including searchable video recordings, and detailed logs of screen sharing, file transfer, and shell activity. GRANULAR ACCESS CONTROL Require access notification and authorization. Define what endpoints users can access, schedule when they can access them, and whitelist applications. COLLABORATION WITHIN SESSIONS Ensure critical systems stay up and running. Allow users to pull both internal and external skilled resources into sessions to build, maintain, and support business services together. NO VPN TUNNEL Allow users and vendors to connect to any system from anywhere, on or off your network. Enable remote access without VPN tunneling, port-forwarding, or complex firewall configurations. No need to re-architect your network. SECURE MOBILE APPS Connect securely from mobile devices. Native mobile apps give technicians desktop-quality access over 3G/WiFi from Android or iOS devices.

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24 THIRD-PARTY VENDOR CORPORATE NETWORK LOW TRUS T LEVEL How Bomgar secures vendor access? Broker the connection Outbound connections Layered Protections Multi-factor authentication Access to specific systems Application whitelist / blacklist Access timeframes Access approval workflow Full audit trail with video

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25 Jump Client Agent Based Console Access Headless Jump Client Agent Based Terminal Access Bomgar Jump (Agent) Professor/U niversity Employee University LAN/WAN DMZ RDP SSH / Telnet Bomgar Jumpoint vPro SSH / Telnet 443 Extend remote connection protocols beyond the LAN without compromising security by using a Layer 7 (Application) approach that incorporates much tighter controls than those available with a traditional VPN

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26 Travis Britt RSMBrian Page Solutions Engineer (770) (770) Thanks For Your Time

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 27 Bomgar Enterprise Remote Support Features CONSOLIDATION Support Multiple Platforms Support Mobile Devices On or Off Network All with Bomgar INTEGRATION ITSM/CRM System Ticketing Systems Security Providers Inventory Systems SERVICE LEVELS Chat-based support Easy Session Initiation Increased First Call Resolution Collaboration and Escalation SECURITY The Appliance Centralized Management Centralized Reporting Multiple Deployment Options