/
Bomgar Bomgar

Bomgar - PowerPoint Presentation

luanne-stotts
luanne-stotts . @luanne-stotts
Follow
452 views
Uploaded On 2016-12-03

Bomgar - PPT Presentation

Privileged Access Management ltDatePresentergt AGENDA Bomgar Overview Bomgar Privileged Access Management Solution Capabilities Deployment Integrations Demo QampA 1 in Enterprise Remote Support market share ID: 496551

bomgar access management privileged access bomgar privileged management amp remote systems secure mobile users support security critical monitor system

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Bomgar" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Bomgar Privileged Access Management

<Date/Presenter>Slide2

AGENDA

Bomgar Overview

Bomgar Privileged Access Management Solution

Capabilities

Deployment

Integrations

Demo

Q&ASlide3

#1

in Enterprise Remote Support market share

Leader in secure

remote support & access management

Trusted by enterprises around the world

Strong revenue &

global growth

Access nearly any system or

device

, anywhere

Strengthen security & compliance

Improve user productivity

9,000+ customers in 65+ countries

Used by secure enterprises large & small

Trusted by top brands across industries

Founded in 2003

Recognized as fastest growing private company 6 years running

Global offices in US, EMEA & APAC

Majority investors: TA Associates

BOMGAR – CONNECTING PEOPLE & TECHNOLOGYSlide4

BOMGAR USE CASES

CUSTOMER SUPPORT

IT SERVICE DESK

PRIVILEGED ACCESS

Access, control, & troubleshoot remote desktops, servers, and mobile devices, no matter the operating system or network location.

Chat, co-browse, and provide remote assistance for your customers. Even support iPad, iPhone or Android apps.

Manage, empower, and audit internal and third-party privileged users to securely access your corporate network and devices.Slide5

BOMGAR PRIVILEGED ACCESS MANAGEMENT

Control privileged access

Monitor and audit sessions

Manage permissions

Improve productivitySlide6

BOMGAR CAPABILITIES

SECURE REMOTE ACCESS

Extend remote connection protocols, such as RDP, command shell, SSH, and Telnet, beyond the LAN without compromising security. Connections are secured by the highest level of encryption.

MONITOR & AUDIT

Monitor sessions in real-time. Review tamper-proof audit trails, including searchable video recordings, and detailed logs of screen sharing, file transfer, and shell activity.

GRANULAR ACCESS CONTROL

Require access notification and authorization. Define what endpoints users can access, schedule when they can access them, and whitelist applications.

COLLABORATION WITHIN SESSIONS

Ensure critical systems stay up and running. Allow users to pull both internal and external skilled resources into sessions to build, maintain, and support business services together.

NO VPN TUNNEL

Allow users and vendors to connect to any system from anywhere, on or off your network. Enable remote access without VPN tunneling, port-forwarding, or complex firewall configurations. No need to re-architect your network.

SECURE MOBILE APPS

Connect securely from mobile

devices. Native mobile apps give technicians desktop-quality access over 3G/

WiFi

from Android or iOS devices.Slide7

Shrink the attack surface on critical assets

Meet compliance requirements by securing, managing, and monitoring access to sensitive systems

Enhance productivity of privileged users by making access easier and more reliable

BOMGAR VALUE DRIVERS

PRODUCTIVITY

SECURITYSlide8

WHO NEEDS BOMGAR PRIVILEGED ACCESS MANAGEMENT?

Owns VPN, other access technologies, and processes to authorize access

Leverages multiple overlapping technologies to increase security profile

Uses SIEM tools like

Splunk

, HP

ArchSight

, and

LogRhythm to aggregate system events and alerts

Responsible for breaking the “cyber kill chain”Slide9

FREQUENT CHALLENGES

Already suffered a breach

Easing the burden of Vendor Access

Risk/Mitigation against cyber breach

Adopting an “assume they are already in” security postureSlide10

Ensure only authorized vendors can connect to critical systems with

3

rd

Party

Access

and Authorization

#1

Protect sensitive data from unauthorized users by

whitelisting

or

blacklisting

what can be seen during a remote session

#2

Find a critical event or cyber breach by searching session transcriptions and recordings

#3

Integrate with a password vault to protect credentials and automate logins using Endpoint Credential Management#4USE CASES AND CAPABILITIESSlide11

BOMGAR ADVANTAGES

INTEGRATIONS

MULTI-PLATFORM

SECURE

ENTERPRISE DESIGN

Support to or from Windows, Mac, Linux, and mobile

On or off network

Architecture

Authentication

Access controls

Audit

Identity Management systems

ITSM / Change Management systems

Collaboration

Licensing

Support & ServicesSlide12

CollaborationSlide13

MobileSlide14

Always ConnectedSlide15

Agentless session management regardless of VPN connectivity

Retire use of less secure technologies like RDP or secure RDP and other traditional technologies

Significant focus on enabling secure access to critical systems from mobile devices leveraging native mobile

applications

Collaboration technologies which encourage multiple individuals securely accessing the same critical systems to ensure uptime and security

WHY BOMGAR?Slide16

B300P Physical Appliance

(Perpetual or Subscription)

Virtual P Virtual Appliance

(Perpetual or Subscription)

SECURE, HARDENED APPLIANCESSlide17

BOMGAR PRIVILEGED ACCESS MANAGEMENT INTEGRATIONS

SIEM

ITSM

PasswordSlide18

LOYAL CUSTOMERS

9,000+ companies around the world trust BomgarSlide19

CUSTOMER CASE STUDY (SAMPLE)

THE SOLUTION

Implemented policies and guidelines around when and from where privileged users can access certain systems.

Can now capture audit logs and video recordings of all remote access activity.

Eliminated need to share VPN access with third-party vendors.

Users can remotely connect to any device or system, anytime, from anywhere, including mobile platforms

.

THE RESULT

Established strict permission settings to manage, control, and monitor vendor access.

Third-parties only have access to just the systems they need to work on, or receive one-time invitations for a specific remote support session.

Maintained compliance with evolving PCI-DSS standards.

REDNER’S WAREHOUSE MARKETS

“With Bomgar, we can establish strict permission settings to manage, control, and monitor vendor access. It allows us to give privileged third parties access to just the systems they need to work on, enhancing security and

productivity.”

NICK HILDAGO

IT DIRECTORSlide20

DemoSlide21

Differentiators

Collaborative

Mobile

Always Connected

Roadmap

PAM

PSM

SAPM

AAPM

SUPM

Unattended

Privileged Systems

Data Center / Servers

Vendor / 3rd Party

Product

BOMGAR PRIVILEGED ACCESS MANAGEMENTSlide22

?

Related Contents


Next Show more