Bomgar Privileged Access Management <Date/Presenter> ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 AGENDA • • • • • • • Bomgar Overview Bomgar Privileged Access Management Solution Capabilities Deployment Integrations Demo Q&A ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 2 BOMGAR – CONNECTING PEOPLE & TECHNOLOGY Leader in secure remote support & access management • Access nearly any system or device, anywhere • Strengthen security & compliance • Improve user productivity Trusted by enterprises around the world • 9,000+ customers in 65+ countries • Used by secure enterprises large & small • Trusted by top brands across industries Strong revenue & global growth • Founded in 2003 • Recognized as fastest growing private company 6 years running • Global offices in US, EMEA & APAC • Majority investors: TA Associates #1 in Enterprise Remote Support market share ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 3 BOMGAR USE CASES IT SERVICE DESK CUSTOMER SUPPORT PRIVILEGED ACCESS Access, control, & troubleshoot remote desktops, servers, and mobile devices, no matter the operating system or network location. Chat, co-browse, and provide remote assistance for your customers. Even support iPad, iPhone or Android apps. Manage, empower, and audit internal and third-party privileged users to securely access your corporate network and devices. ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 4 BOMGAR PRIVILEGED ACCESS MANAGEMENT • Control privileged access • Monitor and audit sessions • Manage permissions • Improve productivity ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 5 BOMGAR CAPABILITIES SECURE REMOTE ACCESS Extend remote connection protocols, such as RDP, command shell, SSH, and Telnet, beyond the LAN without compromising security. Connections are secured by the highest level of encryption. NO VPN TUNNEL Allow users and vendors to connect to any system from anywhere, on or off your network. Enable remote access without VPN tunneling, portforwarding, or complex firewall configurations. No need to rearchitect your network. MONITOR & AUDIT Monitor sessions in real-time. Review tamper-proof audit trails, including searchable video recordings, and detailed logs of screen sharing, file transfer, and shell activity. GRANULAR ACCESS CONTROL Require access notification and authorization. Define what endpoints users can access, schedule when they can access them, and whitelist applications. COLLABORATION WITHIN SESSIONS SECURE MOBILE APPS Ensure critical systems stay up and running. Allow users to pull both internal and external skilled resources into sessions to build, maintain, and support business services together. Connect securely from mobile devices. Native mobile apps give technicians desktop-quality access over 3G/WiFi from Android or iOS devices. ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 6 BOMGAR VALUE DRIVERS • Shrink the attack surface on critical assets • Meet compliance requirements by securing, managing, and monitoring access to sensitive systems • Enhance productivity of privileged users by making access easier and more reliable PRODUCTIVITY ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. SECURITY 7 WHO NEEDS BOMGAR PRIVILEGED ACCESS MANAGEMENT? • Owns VPN, other access technologies, and processes to authorize access • Leverages multiple overlapping technologies to increase security profile • Uses SIEM tools like Splunk, HP ArchSight, and LogRhythm to aggregate system events and alerts • Responsible for breaking the “cyber kill chain” ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 8 FREQUENT CHALLENGES 1. 2. 3. 4. Already suffered a breach Easing the burden of Vendor Access Risk/Mitigation against cyber breach Adopting an “assume they are already in” security posture ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 9 USE CASES AND CAPABILITIES #1 Ensure only authorized vendors can connect to critical systems with 3rd Party Access and Authorization #2 Protect sensitive data from unauthorized users by whitelisting or blacklisting what can be seen during a remote session #3 #4 Find a critical event or cyber breach by searching session transcriptions and recordings Integrate with a password vault to protect credentials and automate logins using Endpoint Credential Management ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 10 BOMGAR ADVANTAGES MULTIPLATFORM • Support to or from Windows, Mac, Linux, and mobile • On or off network SECURE • • • • Architecture Authentication Access controls Audit INTEGRATIONS • Identity Management systems • ITSM / Change Management systems ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. ENTERPRISE DESIGN • Collaboration • Licensing • Support & Services 11 Collaboration ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 12 Mobile ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 13 Always Connected ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 14 WHY BOMGAR? • Agentless session management regardless of VPN connectivity • Retire use of less secure technologies like RDP or secure RDP and other traditional technologies • Significant focus on enabling secure access to critical systems from mobile devices leveraging native mobile applications • Collaboration technologies which encourage multiple individuals securely accessing the same critical systems to ensure uptime and security ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 15 SECURE, HARDENED APPLIANCES B300P Physical Appliance (Perpetual or Subscription) Virtual P Virtual Appliance (Perpetual or Subscription) ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 16 BOMGAR PRIVILEGED ACCESS MANAGEMENT INTEGRATIONS SIEM Password ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. ITSM 17 LOYAL CUSTOMERS 9,000+ companies around the world trust Bomgar ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 18 CUSTOMER CASE STUDY (SAMPLE) REDNER’S WAREHOUSE MARKETS THE SOLUTION • Implemented policies and guidelines around when and from where privileged users can access certain systems. • Can now capture audit logs and video recordings of all remote access activity. • Eliminated need to share VPN access with third-party vendors. • Users can remotely connect to any device or system, anytime, from anywhere, including mobile platforms. “With Bomgar, we can establish strict permission settings to manage, control, and monitor vendor access. It allows us to give privileged third parties access to just the systems they need to work on, enhancing security and productivity.” THE RESULT • Established strict permission settings to manage, control, and monitor vendor access. NICK HILDAGO IT DIRECTOR • Third-parties only have access to just the systems they need to work on, or receive one-time invitations for a specific remote support session. • Maintained compliance with evolving PCI-DSS standards. ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 19 Demo ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 20 BOMGAR PRIVILEGED ACCESS MANAGEMENT • • • Product Roadmap Differentiators Collaborative Mobile PSM SAPM AAPM Always Connected PAM ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. SUPM • • • • Unattended Privileged Systems Data Center / Servers Vendor / 3rd Party 21 ? ©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 22