Market Intelligence You Can Act On Secure Remote Support for CJIS Compliance December 11, 2014.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
BalaBit Shell Control Box
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Internship at IPG Position: IT Analyst Location: Scott Technology Center, Omaha By SRIRAM SURAPANENI.
Privileged Identity Management Enterprise Password Vault
Privileged Account Management Jason Fehrenbach, Product Manager.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
A SOLUTION: 2X REMOTE APPLICATION SERVER. 2X REMOTE APPLICATION SERVER.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services UGA Bomgar Contact: Marcus Henderson.
Hands-On Microsoft Windows Server Connecting Through Terminal Services Terminal server – Enables clients to run services and software applications.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Agenda Current Situation Current Problems Why Ekran System Ekran System Features Architecture Q & A.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Designing Active Directory for Security
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Module 7: Fundamentals of Administering Windows Server 2008.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
SiteWiz – RiT ’ s CAM Solution. Daily IT Challenges Overload of infrastructure information Numerous daily changes Many departments involved No clear picture.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Remote Support.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
2015 NetSymm Overview NETSYMM OVERVIEW December
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IT Support Packs. CUSTOMER SEGMENT IT Service Desk teams who provide internal and external support to traditional systems including desktops, laptops.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Bomgar Secure Remote Access OARNET Presentation.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
C C Introduction to Tivoli Endpoint Manager 8.2 Joe Saylor Tivoli Endpoint Manager Solutions Architect.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
HUB International: Software & Common Applications
Six Steps to Secure Access for Privileged Insiders and Vendors
Common Methods Used to Commit Computer Crimes
Data and Applications Security Developments and Directions
Six Steps to Secure Access for Privileged Insiders and Vendors
Virtual Private Networks (VPN)
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Writing for Cloud Tools, Process, & D
IT Management, Simplified
Presentation transcript:

Market Intelligence You Can Act On Secure Remote Support for CJIS Compliance December 11, 2014

Welcome to our Webinar Webinar Recorded Link ed directly CJIS GROUP Webinar Library Survey

Agenda CJIS GROUP OVERVIEW CJIS POLICY & AUDIT FINDINGS REMOTE ACCESS CONSIDERATIONS PATHWAYS FOR HACKERS REMOTE SUPPORT SECURITY BOMGAR IN A CJIS ENVIRONMENT CASE STUDY REMOTE SUPPORT SOLUTION Q&A

Presenters Bryan Hood Senior Solutions Engineer Scott Braynard Vice President, Public Sector Lauren Franco Marketing Manager

CJIS GROUP How do we support State and Local Government? CJIS GROUP Database helps officials: Fund new initiatives by seeing how other agencies paid for these services. Locate vendors who are successful in the state and local market. Connect more with agencies working on similar objectives.

FBI CJIS POLICY The CJIS Security Policy provides a secure framework of: laws, standards, and elements of published and vetted policies for accomplishing the mission across a broad spectrum of the criminal justice and noncriminal justice communities.

Overcoming Funding Barrier “ Baking in” to a larger solution Leveraging other agency’s technology investments Investing in a platform that provides flexibility for the future = good investment over time Types of Agencies Procuring Help Desk Support in 2014

Remote Support for CJIS Compliance

BOMGAR – Revolutionizing Remote Support Securely support remote Windows, Mac, Linux & Mobile Devices Trusted by 8,500+ customers around the world:

Criminal Justice Information Services (CJIS) Security Policy Remote Access The agency shall authorize, monitor, and control all methods of remote access to the information system. Remote access is any temporary access to an agency’s information system by a user (or an information system) communicating temporarily through an external, non-agency-controlled network (e.g., the Internet). The agency shall employ automated mechanisms to facilitate the monitoring and control of remote access methods. The agency shall control all remote accesses through managed access control points. The agency may permit remote access for privileged functions only for compelling operational needs but shall document the rationale for such access in the security plan for the information system.

Remote Access Considerations INTEGRATION CONSOLIDATION SECURITY SERVICE LEVELS Support Multiple Platforms On or Off Network Legacy Leftovers Little or no logging Shared Accounts No Central Configuration Insecure communication Security Providers Ticketing Systems Inventory Systems Time to resolution First Call Resolution Productivity Customer Satisfaction

Support All of Your Devices with a Single Solution

Unsecure Remote Access – Pathway for Hackers “When targeting companies, typically SMBs, the criminals access victim networks via Microsoft’s Remote Desktop Protocol (RDP) either via unpatched vulnerabilities or weak passwords.” 2013 Data Breach Investigations Report “Organizations that use third-party support typically use remote access applications like Terminal Services (teamserv) or Remote Desktop Protocol (RDP), pcAnywhere, Virtual Network Client (VNC), LogMeIn or Remote Administrator to access their customers’ systems. If these utilities are left enabled, attackers can access them as though they are legitimate system administrators.” 2013 Global Security Report "The bad guys have continually used remote access login to perpetrate their crimes and breaches against POS systems, since they gain the privileges and visibility they need with software like LogMeIn. It's a huge vulnerability that most enterprises don't currently have enough control over, given their relationships with service providers and contractors. They need to tighten up that glaring hole by enforcing strong user authentication into remote- access facilities into their systems and auditing the access that does take place." Avivah Litan in BankInfoSecurity, July 2014

Remote Support Security Architecture – Centralized, hardened appliance keeps data behind your own firewall Authentication – Integrates with your identity management systems (e.g. Active Directory) Access Controls – Rep Permissions to control who accesses what, when and from where Audit – Full session log and video recording of each session

Bomgar in a CJIS Environment

Case Study: County IT Department Supports approximately 400 county employees and 700 computers, servers and other devices located in 17 county sites Sites include the sheriff’s office, health department, landfill, animal control and the airport Need to meet CJIS and HIPAA requirements Previously used Windows built-in freeware tools - not always effective, and hour-long trips to the county sites were often required Bomgar is saving technicians more than 50 percent of the time they used to spend in the field while increasing CJIS compliance “For security reasons, I knew I wanted a remote support solution that was not cloud-based. Having the Bomgar appliance on-premise has proven to be an important feature because the FBI CJIS rules have increased requirements for secure communications. As our county government continues to grow, I know I have a remote support solution in place that ensures secure, effective remote assistance for our users. The bottom line is that Bomgar just makes my job a whole lot easier.” County IT Systems Administrator

Case Study: State IT Department Large state IT teams were using various remote access tools to support 47,000+ employees Employees were targeted by hackers posing as Microsoft support technicians Needed to consolidate to a single remote access tool that employees could recognize and trust Original tools didn’t capture audit trails or enable vendor management Needed a solution that could be used to support all employees, on and off the network, while meeting CJIS compliance requirements

Case Study: Software Vendor Operates the nation’s largest law enforcement real-time, information sharing, communication and data interoperability network Supports law enforcement officers using Windows desktops and laptops, in an office and on the road Texas Department of Public Safety informed them that current remote support solution didn’t meet CJIS requirements Bomgar makes it easy for the team to securely access computers at any time to readily resolve issues “If you are looking for a secure remote support solution that is easy to use, Bomgar is the way to go. For our specific needs, the fact that Bomgar meets compliance standards made it the best solution for us.” V.P. of Operations

Remote Support Solution

Q&A Bryan Hood Senior Solutions Engineer Scott Braynard Vice President, Public Sector Lauren Franco Marketing Manager

Thank you for attending Webinar recording will be available on For additional questions please or call For Remote Support Questions please Scott Braynard