Presentation is loading. Please wait.

Presentation is loading. Please wait.

BOMGAR REMOTE SUPPORT Karl Lankford

Similar presentations


Presentation on theme: "BOMGAR REMOTE SUPPORT Karl Lankford"— Presentation transcript:

1 BOMGAR REMOTE SUPPORT Karl Lankford
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

2 About Bomgar Trusted by more than 14,000 Companies
The fastest, most secure way for experts to access and support the people that need them. Trusted by more than 14,000 Companies 15 year history of innovation 300+ Employees across US, EMEA, & APAC Leader in secure remote support and access management #1 in Enterprise Remote Support, according to IDC

3 Bomgar Privileged Access
SERVICE DESK CUSTOMER SUPPORT Access, control, & troubleshoot remote desktops, servers, and mobile devices, no matter the operating system or network location Chat, co-browse, and provide remote assistance for your customers. Even support iPad, iPhone or Android apps Bomgar Remote Support Bomgar Privileged Access PRIVILEGED ACCESS VENDOR ACCESS Manage, empower, and audit internal privileged users to securely access your sensitive and critical systems Control, monitor and manage third-party and vendor access to your corporate network and devices

4 DEPLOYMENT & ARCHITECTURE
Why do our customers buy Bomgar? INTEGRATION CONSOLIDATION SERVICE LEVELS DEPLOYMENT & ARCHITECTURE IDENTITY MANAGEMENT FEATURES Consolidation: Support Multiple Platforms Support Mobile Devices On or Off Network Avoid cost and maintenance of multiple tools Includes chat-based and remote camera sharing support Service Levels: Easy Session Initiation Mobile and web-based support Increased First Call Resolution Collaboration and Escalation Ease of use and reliability increase CSAT Integration: Streamline processes for better efficiency ITSM/CRM System Ticketing Systems Security Providers Inventory Systems Knowledge Management Systems Deployment/Architecture: On-premise Physical or Virtual Appliance Bomgar Secure Cloud Firewall friendly “outbound” connections Features: Set granular, role-based permissions Record and monitor session activity Easily export data for an audit or in-depth monitoring Centralized Management Identity Management: Credential injection Two factor authentication- basic and enhanced Integration with Active Directory and SAML ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

5 Over 85% of respondents saw an increase in FCR of more than 10% with 1/3 reporting and increase of more than 25% 85% were able to increase Customer Satisfaction by more than 10% with 43% reporting a increase of 20% or more. 3 out of 4 respondents had an increase of agent productivity of more than 20% 3 out of 4 companies reported that agents were “Very Satisfied” with Bomgar More than 70% were able to reduce incident handling time by at least 10% CUSTOMER RESULTS ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

6 iOS Screen Sharing Now Available with Bomgar and iOS 11
View video at: Ios video. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

7 ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE

8

9 BOMGAR PRIVILEGED ACCESS
Karl Lankford

10 Secure Access For… INSIDERS
Insider Access INSIDERS Third-Party Vendor Access Give administrators the access to the systems they need without harming productivity. Insider misuse cases are the most likely to take Months or years to discover.. 2016 VERIZON DATA BREAK INVESTIGATION Audit and Compliance

11 Secure Access For… THIRD-PARTY VENDORS
Insider Access THIRD-PARTY VENDORS Third-Party Vendor Access Grant contractors and vendors privileged access to critical assets without giving them a VPN. On average, 89 vendors per week have access to company networks. VENDOR VULNERABILITY INDEX 2016 Audit and Compliance

12 Secure Access For… AUDIT AND COMPLIANCE
Insider Access AUDIT AND COMPLIANCE Third-Party Vendor Access Set granular permissions and record activity for privileged accounts to ease audit and compliance. 50% list cyber risk among the top three challenges for Compliance over the next 12 months. ACCENTURE’S 2016 COMPLIANCE RISK STUDY Audit and Compliance

13 Bomgar Privileged Access
PROTECT THE ACCESS Enable role-based access to specific systems and define session parameters, such as access timeframes, required approvals, and permitted functions. MANAGE ACTIVITY Actively manage the ongoing operational use of network devices and hardware on the network. ANALYZE & AUDIT DATA Understand what privileged users are actually doing within the network and audit for misuse, while meeting audit trail requirements.

14 Bomgar Vault Secure Password Storage
Store passwords securely Uncover potentially non- compliant credentials in your network Automatically rotate credentials

15


Download ppt "BOMGAR REMOTE SUPPORT Karl Lankford"

Similar presentations


Ads by Google