Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.

Similar presentations


Presentation on theme: "©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management."— Presentation transcript:

1 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management

2 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 2 AGENDA Bomgar Overview Bomgar Privileged Access Management Solution Capabilities Deployment Integrations Demo Q&A

3 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 3 #1 in Enterprise Remote Support market share Leader in secure remote support & access management Trusted by enterprises around the world Strong revenue & global growth Access nearly any system or device, anywhere Strengthen security & compliance Improve user productivity 9,000+ customers in 65+ countries Used by secure enterprises large & small Trusted by top brands across industries Founded in 2003 Recognized as fastest growing private company 6 years running Global offices in US, EMEA & APAC Majority investors: TA Associates BOMGAR – CONNECTING PEOPLE & TECHNOLOGY

4 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 4 BOMGAR USE CASES CUSTOMER SUPPORT IT SERVICE DESK PRIVILEGED ACCESS Access, control, & troubleshoot remote desktops, servers, and mobile devices, no matter the operating system or network location. Chat, co-browse, and provide remote assistance for your customers. Even support iPad, iPhone or Android apps. Manage, empower, and audit internal and third-party privileged users to securely access your corporate network and devices.

5 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 5 BOMGAR PRIVILEGED ACCESS MANAGEMENT Control privileged access Monitor and audit sessions Manage permissions Improve productivity

6 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 6 BOMGAR CAPABILITIES SECURE REMOTE ACCESS Extend remote connection protocols, such as RDP, command shell, SSH, and Telnet, beyond the LAN without compromising security. Connections are secured by the highest level of encryption. MONITOR & AUDIT Monitor sessions in real-time. Review tamper-proof audit trails, including searchable video recordings, and detailed logs of screen sharing, file transfer, and shell activity. GRANULAR ACCESS CONTROL Require access notification and authorization. Define what endpoints users can access, schedule when they can access them, and whitelist applications. COLLABORATION WITHIN SESSIONS Ensure critical systems stay up and running. Allow users to pull both internal and external skilled resources into sessions to build, maintain, and support business services together. NO VPN TUNNEL Allow users and vendors to connect to any system from anywhere, on or off your network. Enable remote access without VPN tunneling, port- forwarding, or complex firewall configurations. No need to re- architect your network. SECURE MOBILE APPS Connect securely from mobile devices. Native mobile apps give technicians desktop-quality access over 3G/WiFi from Android or iOS devices.

7 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 7 Shrink the attack surface on critical assets Meet compliance requirements by securing, managing, and monitoring access to sensitive systems Enhance productivity of privileged users by making access easier and more reliable BOMGAR VALUE DRIVERS PRODUCTIVITY SECURITY

8 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 8 WHO NEEDS BOMGAR PRIVILEGED ACCESS MANAGEMENT? Owns VPN, other access technologies, and processes to authorize access Leverages multiple overlapping technologies to increase security profile Uses SIEM tools like Splunk, HP ArchSight, and LogRhythm to aggregate system events and alerts Responsible for breaking the “cyber kill chain”

9 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 9 FREQUENT CHALLENGES 1.Already suffered a breach 2.Easing the burden of Vendor Access 3.Risk/Mitigation against cyber breach 4.Adopting an “assume they are already in” security posture

10 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 10 Ensure only authorized vendors can connect to critical systems with 3 rd Party Access and Authorization #1 Protect sensitive data from unauthorized users by whitelisting or blacklisting what can be seen during a remote session #2 Find a critical event or cyber breach by searching session transcriptions and recordings #3 Integrate with a password vault to protect credentials and automate logins using Endpoint Credential Management #4 USE CASES AND CAPABILITIES

11 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 11 BOMGAR ADVANTAGES INTEGRATIONS MULTI- PLATFORM SECURE ENTERPRISE DESIGN Support to or from Windows, Mac, Linux, and mobile On or off network Architecture Authentication Access controls Audit Identity Management systems ITSM / Change Management systems Collaboration Licensing Support & Services

12 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 12 Collaboration

13 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 13 Mobile

14 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 14 Always Connected

15 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 15 Agentless session management regardless of VPN connectivity Retire use of less secure technologies like RDP or secure RDP and other traditional technologies Significant focus on enabling secure access to critical systems from mobile devices leveraging native mobile applications Collaboration technologies which encourage multiple individuals securely accessing the same critical systems to ensure uptime and security WHY BOMGAR?

16 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 16 B300P Physical Appliance (Perpetual or Subscription) Virtual P Virtual Appliance (Perpetual or Subscription) SECURE, HARDENED APPLIANCES

17 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 17 BOMGAR PRIVILEGED ACCESS MANAGEMENT INTEGRATIONS SIEM ITSM Password

18 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 18 LOYAL CUSTOMERS 9,000+ companies around the world trust Bomgar

19 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 19 CUSTOMER CASE STUDY (SAMPLE) THE SOLUTION Implemented policies and guidelines around when and from where privileged users can access certain systems. Can now capture audit logs and video recordings of all remote access activity. Eliminated need to share VPN access with third-party vendors. Users can remotely connect to any device or system, anytime, from anywhere, including mobile platforms. THE RESULT Established strict permission settings to manage, control, and monitor vendor access. Third-parties only have access to just the systems they need to work on, or receive one-time invitations for a specific remote support session. Maintained compliance with evolving PCI-DSS standards. REDNER’S WAREHOUSE MARKETS “With Bomgar, we can establish strict permission settings to manage, control, and monitor vendor access. It allows us to give privileged third parties access to just the systems they need to work on, enhancing security and productivity.” NICK HILDAGO IT DIRECTOR

20 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 20 Demo

21 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 21 Differentiators Collaborative Mobile Always Connected Roadmap PAM PSMSAPMAAPMSUPM Unattended Privileged Systems Data Center / Servers Vendor / 3rd Party Product BOMGAR PRIVILEGED ACCESS MANAGEMENT

22 ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 22 ?


Download ppt "©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management."

Similar presentations


Ads by Google