Bomgar Privileged Access Management
<Date/Presenter>
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
1
AGENDA
•
•
•
•
•
•
•
Bomgar Overview
Bomgar Privileged Access Management Solution
Capabilities
Deployment
Integrations
Demo
Q&A
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
2
BOMGAR – CONNECTING PEOPLE & TECHNOLOGY
Leader in secure
remote support &
access management
• Access nearly any
system or device,
anywhere
• Strengthen security &
compliance
• Improve user productivity
Trusted by
enterprises around
the world
• 9,000+ customers in 65+
countries
• Used by secure enterprises
large & small
• Trusted by top brands
across industries
Strong revenue &
global growth
• Founded in 2003
• Recognized as fastest
growing private
company 6 years
running
• Global offices in US,
EMEA & APAC
• Majority investors: TA
Associates
#1 in Enterprise
Remote Support
market share
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
3
BOMGAR USE CASES
IT SERVICE
DESK
CUSTOMER
SUPPORT
PRIVILEGED
ACCESS
Access, control, &
troubleshoot remote desktops,
servers, and mobile devices,
no matter the operating
system or network location.
Chat, co-browse, and
provide remote assistance
for your customers. Even
support iPad, iPhone or
Android apps.
Manage, empower, and
audit internal and third-party
privileged users to securely
access your corporate
network and devices.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
4
BOMGAR PRIVILEGED ACCESS MANAGEMENT
• Control privileged
access
• Monitor and audit
sessions
• Manage
permissions
• Improve productivity
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
5
BOMGAR CAPABILITIES
SECURE REMOTE
ACCESS
Extend remote connection protocols,
such as RDP, command shell, SSH,
and Telnet, beyond the LAN without
compromising security. Connections
are secured by the highest level of
encryption.
NO VPN TUNNEL
Allow users and vendors to connect
to any system from anywhere, on or
off your network. Enable remote
access without VPN tunneling, portforwarding, or complex firewall
configurations. No need to rearchitect your network.
MONITOR & AUDIT
Monitor sessions in real-time.
Review tamper-proof audit trails,
including searchable video
recordings, and detailed logs of
screen sharing, file transfer, and
shell activity.
GRANULAR ACCESS
CONTROL
Require access notification and
authorization. Define what
endpoints users can access,
schedule when they can access
them, and whitelist applications.
COLLABORATION
WITHIN SESSIONS
SECURE MOBILE
APPS
Ensure critical systems stay up and
running. Allow users to pull both
internal and external skilled resources
into sessions to build, maintain, and
support business services together.
Connect securely from mobile
devices. Native mobile apps give
technicians desktop-quality
access over 3G/WiFi from
Android or iOS devices.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
6
BOMGAR VALUE DRIVERS
• Shrink the attack surface on critical assets
• Meet compliance requirements by securing, managing, and monitoring
access to sensitive systems
• Enhance productivity of privileged users by making access easier and more
reliable
PRODUCTIVITY
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
SECURITY
7
WHO NEEDS BOMGAR PRIVILEGED ACCESS MANAGEMENT?
• Owns VPN, other access
technologies, and processes to
authorize access
• Leverages multiple overlapping
technologies to increase security
profile
• Uses SIEM tools like Splunk, HP
ArchSight, and LogRhythm to
aggregate system events and alerts
• Responsible for breaking the “cyber
kill chain”
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
8
FREQUENT CHALLENGES
1.
2.
3.
4.
Already suffered a breach
Easing the burden of Vendor Access
Risk/Mitigation against cyber breach
Adopting an “assume they are already
in” security posture
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
9
USE CASES AND CAPABILITIES
#1
Ensure only
authorized
vendors can
connect to
critical systems
with
3rd Party
Access and
Authorization
#2
Protect sensitive
data from
unauthorized
users by
whitelisting or
blacklisting what
can be seen
during a remote
session
#3
#4
Find a critical
event or cyber
breach by
searching
session
transcriptions
and recordings
Integrate with a
password vault
to protect
credentials and
automate logins
using Endpoint
Credential
Management
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
10
BOMGAR ADVANTAGES
MULTIPLATFORM
• Support to or
from Windows,
Mac, Linux, and
mobile
• On or off network
SECURE
•
•
•
•
Architecture
Authentication
Access controls
Audit
INTEGRATIONS
• Identity
Management
systems
• ITSM / Change
Management
systems
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
ENTERPRISE
DESIGN
• Collaboration
• Licensing
• Support &
Services
11
Collaboration
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
12
Mobile
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
13
Always Connected
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
14
WHY BOMGAR?
• Agentless session management
regardless of VPN connectivity
• Retire use of less secure
technologies like RDP or secure
RDP and other traditional
technologies
• Significant focus on enabling
secure access to critical systems
from mobile devices leveraging
native mobile applications
• Collaboration technologies which
encourage multiple individuals
securely accessing the same
critical systems to ensure uptime
and security
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
15
SECURE, HARDENED APPLIANCES
B300P Physical Appliance (Perpetual or Subscription)
Virtual P Virtual Appliance (Perpetual or Subscription)
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
16
BOMGAR PRIVILEGED ACCESS MANAGEMENT INTEGRATIONS
SIEM
Password
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
ITSM
17
LOYAL CUSTOMERS
9,000+ companies around the world trust Bomgar
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
18
CUSTOMER CASE STUDY (SAMPLE)
REDNER’S WAREHOUSE MARKETS
THE SOLUTION
• Implemented policies and guidelines around when and from
where privileged users can access certain systems.
• Can now capture audit logs and video recordings of all remote
access activity.
• Eliminated need to share VPN access with third-party vendors.
• Users can remotely connect to any device or system, anytime,
from anywhere, including mobile platforms.
“With Bomgar, we can
establish strict permission
settings to manage,
control, and monitor
vendor access. It allows
us to give privileged third
parties access to just the
systems they need to
work on, enhancing
security and productivity.”
THE RESULT
• Established strict permission settings to manage, control, and
monitor vendor access.
NICK HILDAGO
IT DIRECTOR
• Third-parties only have access to just the systems they need to
work on, or receive one-time invitations for a specific remote
support session.
• Maintained compliance with evolving PCI-DSS standards.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
19
Demo
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
20
BOMGAR PRIVILEGED ACCESS MANAGEMENT
•
•
•
Product
Roadmap
Differentiators
Collaborative
Mobile
PSM
SAPM
AAPM
Always Connected
PAM
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
SUPM
•
•
•
•
Unattended
Privileged Systems
Data Center / Servers
Vendor / 3rd Party
21
?
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE.
22