Privileged Access Management ltDatePresentergt AGENDA Bomgar Overview Bomgar Privileged Access Management Solution Capabilities Deployment Integrations Demo QampA 1 in Enterprise Remote Support market share ID: 496551
Download Presentation The PPT/PDF document "Bomgar" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Bomgar Privileged Access Management
<Date/Presenter>Slide2
AGENDA
Bomgar Overview
Bomgar Privileged Access Management Solution
Capabilities
Deployment
Integrations
Demo
Q&ASlide3
#1
in Enterprise Remote Support market share
Leader in secure
remote support & access management
Trusted by enterprises around the world
Strong revenue &
global growth
Access nearly any system or
device
, anywhere
Strengthen security & compliance
Improve user productivity
9,000+ customers in 65+ countries
Used by secure enterprises large & small
Trusted by top brands across industries
Founded in 2003
Recognized as fastest growing private company 6 years running
Global offices in US, EMEA & APAC
Majority investors: TA Associates
BOMGAR – CONNECTING PEOPLE & TECHNOLOGYSlide4
BOMGAR USE CASES
CUSTOMER SUPPORT
IT SERVICE DESK
PRIVILEGED ACCESS
Access, control, & troubleshoot remote desktops, servers, and mobile devices, no matter the operating system or network location.
Chat, co-browse, and provide remote assistance for your customers. Even support iPad, iPhone or Android apps.
Manage, empower, and audit internal and third-party privileged users to securely access your corporate network and devices.Slide5
BOMGAR PRIVILEGED ACCESS MANAGEMENT
Control privileged access
Monitor and audit sessions
Manage permissions
Improve productivitySlide6
BOMGAR CAPABILITIES
SECURE REMOTE ACCESS
Extend remote connection protocols, such as RDP, command shell, SSH, and Telnet, beyond the LAN without compromising security. Connections are secured by the highest level of encryption.
MONITOR & AUDIT
Monitor sessions in real-time. Review tamper-proof audit trails, including searchable video recordings, and detailed logs of screen sharing, file transfer, and shell activity.
GRANULAR ACCESS CONTROL
Require access notification and authorization. Define what endpoints users can access, schedule when they can access them, and whitelist applications.
COLLABORATION WITHIN SESSIONS
Ensure critical systems stay up and running. Allow users to pull both internal and external skilled resources into sessions to build, maintain, and support business services together.
NO VPN TUNNEL
Allow users and vendors to connect to any system from anywhere, on or off your network. Enable remote access without VPN tunneling, port-forwarding, or complex firewall configurations. No need to re-architect your network.
SECURE MOBILE APPS
Connect securely from mobile
devices. Native mobile apps give technicians desktop-quality access over 3G/
WiFi
from Android or iOS devices.Slide7
Shrink the attack surface on critical assets
Meet compliance requirements by securing, managing, and monitoring access to sensitive systems
Enhance productivity of privileged users by making access easier and more reliable
BOMGAR VALUE DRIVERS
PRODUCTIVITY
SECURITYSlide8
WHO NEEDS BOMGAR PRIVILEGED ACCESS MANAGEMENT?
Owns VPN, other access technologies, and processes to authorize access
Leverages multiple overlapping technologies to increase security profile
Uses SIEM tools like
Splunk
, HP
ArchSight
, and
LogRhythm to aggregate system events and alerts
Responsible for breaking the “cyber kill chain”Slide9
FREQUENT CHALLENGES
Already suffered a breach
Easing the burden of Vendor Access
Risk/Mitigation against cyber breach
Adopting an “assume they are already in” security postureSlide10
Ensure only authorized vendors can connect to critical systems with
3
rd
Party
Access
and Authorization
#1
Protect sensitive data from unauthorized users by
whitelisting
or
blacklisting
what can be seen during a remote session
#2
Find a critical event or cyber breach by searching session transcriptions and recordings
#3
Integrate with a password vault to protect credentials and automate logins using Endpoint Credential Management#4USE CASES AND CAPABILITIESSlide11
BOMGAR ADVANTAGES
INTEGRATIONS
MULTI-PLATFORM
SECURE
ENTERPRISE DESIGN
Support to or from Windows, Mac, Linux, and mobile
On or off network
Architecture
Authentication
Access controls
Audit
Identity Management systems
ITSM / Change Management systems
Collaboration
Licensing
Support & ServicesSlide12
CollaborationSlide13
MobileSlide14
Always ConnectedSlide15
Agentless session management regardless of VPN connectivity
Retire use of less secure technologies like RDP or secure RDP and other traditional technologies
Significant focus on enabling secure access to critical systems from mobile devices leveraging native mobile
applications
Collaboration technologies which encourage multiple individuals securely accessing the same critical systems to ensure uptime and security
WHY BOMGAR?Slide16
B300P Physical Appliance
(Perpetual or Subscription)
Virtual P Virtual Appliance
(Perpetual or Subscription)
SECURE, HARDENED APPLIANCESSlide17
BOMGAR PRIVILEGED ACCESS MANAGEMENT INTEGRATIONS
SIEM
ITSM
PasswordSlide18
LOYAL CUSTOMERS
9,000+ companies around the world trust BomgarSlide19
CUSTOMER CASE STUDY (SAMPLE)
THE SOLUTION
Implemented policies and guidelines around when and from where privileged users can access certain systems.
Can now capture audit logs and video recordings of all remote access activity.
Eliminated need to share VPN access with third-party vendors.
Users can remotely connect to any device or system, anytime, from anywhere, including mobile platforms
.
THE RESULT
Established strict permission settings to manage, control, and monitor vendor access.
Third-parties only have access to just the systems they need to work on, or receive one-time invitations for a specific remote support session.
Maintained compliance with evolving PCI-DSS standards.
REDNER’S WAREHOUSE MARKETS
“With Bomgar, we can establish strict permission settings to manage, control, and monitor vendor access. It allows us to give privileged third parties access to just the systems they need to work on, enhancing security and
productivity.”
NICK HILDAGO
IT DIRECTORSlide20
DemoSlide21
Differentiators
Collaborative
Mobile
Always Connected
Roadmap
PAM
PSM
SAPM
AAPM
SUPM
Unattended
Privileged Systems
Data Center / Servers
Vendor / 3rd Party
Product
BOMGAR PRIVILEGED ACCESS MANAGEMENTSlide22
?