©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Network Systems Sales LLC
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
BalaBit Shell Control Box
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Privileged Account Management Jason Fehrenbach, Product Manager.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Single Identity – Multiple services how do I stay compliant? Wade Tongen NA Commercial SE.
THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services UGA Bomgar Contact: Marcus Henderson.
Netop Remote Control Trusted. Secure. Experienced.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Sales Play Reference Guide INTERNAL USE ONLY © BMC Software Sales Play BOMGAR extends BMC’s Service Desk and Service Automation solutions by adding appliance-
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Dell Connected Security Solutions Simplify & unify.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Remote Support.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Access resources in a federation partner organization.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
User and Device Management
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Bomgar Secure Remote Access OARNET Presentation.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Market Intelligence You Can Act On Secure Remote Support for CJIS Compliance December 11, 2014.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Total Enterprise Mobility Comprehensive Management and Security
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
OFFICE 365 APP BUILDER PROFILE: Druva
Six Steps to Secure Access for Privileged Insiders and Vendors
2016 Citrix presentation.
Six Steps to Secure Access for Privileged Insiders and Vendors
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Data Security for Microsoft Azure
Access and Information Protection Product Overview October 2013
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Increase productivity
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
Microsoft Data Insights Summit
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 2 AGENDA Bomgar Overview Bomgar Privileged Access Management Solution Capabilities Deployment Integrations Demo Q&A

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 3 #1 in Enterprise Remote Support market share Leader in secure remote support & access management Trusted by enterprises around the world Strong revenue & global growth Access nearly any system or device, anywhere Strengthen security & compliance Improve user productivity 9,000+ customers in 65+ countries Used by secure enterprises large & small Trusted by top brands across industries Founded in 2003 Recognized as fastest growing private company 6 years running Global offices in US, EMEA & APAC Majority investors: TA Associates BOMGAR – CONNECTING PEOPLE & TECHNOLOGY

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 4 BOMGAR USE CASES CUSTOMER SUPPORT IT SERVICE DESK PRIVILEGED ACCESS Access, control, & troubleshoot remote desktops, servers, and mobile devices, no matter the operating system or network location. Chat, co-browse, and provide remote assistance for your customers. Even support iPad, iPhone or Android apps. Manage, empower, and audit internal and third-party privileged users to securely access your corporate network and devices.

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 5 BOMGAR PRIVILEGED ACCESS MANAGEMENT Control privileged access Monitor and audit sessions Manage permissions Improve productivity

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 6 BOMGAR CAPABILITIES SECURE REMOTE ACCESS Extend remote connection protocols, such as RDP, command shell, SSH, and Telnet, beyond the LAN without compromising security. Connections are secured by the highest level of encryption. MONITOR & AUDIT Monitor sessions in real-time. Review tamper-proof audit trails, including searchable video recordings, and detailed logs of screen sharing, file transfer, and shell activity. GRANULAR ACCESS CONTROL Require access notification and authorization. Define what endpoints users can access, schedule when they can access them, and whitelist applications. COLLABORATION WITHIN SESSIONS Ensure critical systems stay up and running. Allow users to pull both internal and external skilled resources into sessions to build, maintain, and support business services together. NO VPN TUNNEL Allow users and vendors to connect to any system from anywhere, on or off your network. Enable remote access without VPN tunneling, port- forwarding, or complex firewall configurations. No need to re- architect your network. SECURE MOBILE APPS Connect securely from mobile devices. Native mobile apps give technicians desktop-quality access over 3G/WiFi from Android or iOS devices.

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 7 Shrink the attack surface on critical assets Meet compliance requirements by securing, managing, and monitoring access to sensitive systems Enhance productivity of privileged users by making access easier and more reliable BOMGAR VALUE DRIVERS PRODUCTIVITY SECURITY

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 8 WHO NEEDS BOMGAR PRIVILEGED ACCESS MANAGEMENT? Owns VPN, other access technologies, and processes to authorize access Leverages multiple overlapping technologies to increase security profile Uses SIEM tools like Splunk, HP ArchSight, and LogRhythm to aggregate system events and alerts Responsible for breaking the “cyber kill chain”

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 9 FREQUENT CHALLENGES 1.Already suffered a breach 2.Easing the burden of Vendor Access 3.Risk/Mitigation against cyber breach 4.Adopting an “assume they are already in” security posture

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 10 Ensure only authorized vendors can connect to critical systems with 3 rd Party Access and Authorization #1 Protect sensitive data from unauthorized users by whitelisting or blacklisting what can be seen during a remote session #2 Find a critical event or cyber breach by searching session transcriptions and recordings #3 Integrate with a password vault to protect credentials and automate logins using Endpoint Credential Management #4 USE CASES AND CAPABILITIES

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 11 BOMGAR ADVANTAGES INTEGRATIONS MULTI- PLATFORM SECURE ENTERPRISE DESIGN Support to or from Windows, Mac, Linux, and mobile On or off network Architecture Authentication Access controls Audit Identity Management systems ITSM / Change Management systems Collaboration Licensing Support & Services

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 12 Collaboration

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 13 Mobile

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 14 Always Connected

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 15 Agentless session management regardless of VPN connectivity Retire use of less secure technologies like RDP or secure RDP and other traditional technologies Significant focus on enabling secure access to critical systems from mobile devices leveraging native mobile applications Collaboration technologies which encourage multiple individuals securely accessing the same critical systems to ensure uptime and security WHY BOMGAR?

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 16 B300P Physical Appliance (Perpetual or Subscription) Virtual P Virtual Appliance (Perpetual or Subscription) SECURE, HARDENED APPLIANCES

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 17 BOMGAR PRIVILEGED ACCESS MANAGEMENT INTEGRATIONS SIEM ITSM Password

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 18 LOYAL CUSTOMERS 9,000+ companies around the world trust Bomgar

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 19 CUSTOMER CASE STUDY (SAMPLE) THE SOLUTION Implemented policies and guidelines around when and from where privileged users can access certain systems. Can now capture audit logs and video recordings of all remote access activity. Eliminated need to share VPN access with third-party vendors. Users can remotely connect to any device or system, anytime, from anywhere, including mobile platforms. THE RESULT Established strict permission settings to manage, control, and monitor vendor access. Third-parties only have access to just the systems they need to work on, or receive one-time invitations for a specific remote support session. Maintained compliance with evolving PCI-DSS standards. REDNER’S WAREHOUSE MARKETS “With Bomgar, we can establish strict permission settings to manage, control, and monitor vendor access. It allows us to give privileged third parties access to just the systems they need to work on, enhancing security and productivity.” NICK HILDAGO IT DIRECTOR

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 20 Demo

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 21 Differentiators Collaborative Mobile Always Connected Roadmap PAM PSMSAPMAAPMSUPM Unattended Privileged Systems Data Center / Servers Vendor / 3rd Party Product BOMGAR PRIVILEGED ACCESS MANAGEMENT

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 22 ?