BOMGAR AT WILLIAMSON CO



Similar documents
BOMGAR FOR VENDOR ACCESS SECURE REMOTE ACCESS FOR THIRD-PARTIES

BOMGAR.COM BOMGAR VS. LOGMEIN RESCUE UPDATED: 10/6/2015

Bomgar Corporation. Bomgar Application Security Assessment Summary January 26, This document is the property of Bomgar Corporation.

BOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Remote Support: Key Metrics to drive Improvement in your Center

Secure Virtual Assist/ Access/Meeting

SECURING YOUR REMOTE DESKTOP CONNECTION

Five keys to a more secure data environment

Hosted SharePoint: Questions every provider should answer

Software that provides secure access to technology, everywhere.

Supplier Security Assessment Questionnaire

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

Bomgar 10.6 License Comparison

How To Protect Your Data From Being Stolen

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Get what s right for your business. Technologies.

Remote Access Procedure. e-governance

Information Security for the Rest of Us

custom hosting for how you do business

SECURE ACCESS TO THE VIRTUAL DATA CENTER

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

NCSU SSO. Case Study

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

F5 and Microsoft Exchange Security Solutions

THE OPEN UNIVERSITY OF TANZANIA

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Franchise Data Compromise Trends and Cardholder. December, 2010

Operations Manager Comprehensive, secure remote monitoring and management of your entire digital signage network infrastructure

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

Why The Security You Bought Yesterday, Won t Save You Today

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Cisco Software-as-a-Service (SaaS) Access Control

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

Protecting systems and patient privacy

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Overcoming PCI Compliance Challenges

Alert (TA14-212A) Backoff Point-of-Sale Malware

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

FISMA / NIST REVISION 3 COMPLIANCE

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

BeyondInsight Version 5.6 New and Updated Features

Unisys Internet Remote Support

The Essential Security Checklist. for Enterprise Endpoint Backup

CONTENTS. PCI DSS Compliance Guide

Automate PCI Compliance Monitoring, Investigation & Reporting

Internet threats: steps to security for your small business

The Education Fellowship Finance Centralisation IT Security Strategy

BMC s Security Strategy for ITSM in the SaaS Environment

A Decision Maker s Guide to Securing an IT Infrastructure

Client Security Risk Assessment Questionnaire

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Cisco ASA 5500 Series Business Edition

Next Generation Jump Servers for Industrial Control Systems

Research Information Security Guideline

Barracuda Web Site Firewall Ensures PCI DSS Compliance

PCI Compliance. by: David Koston

High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Best Practices for PCI DSS V3.0 Network Security Compliance

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

OPC & Security Agenda

Network and Host-based Vulnerability Assessment

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

CLOUD SERVICES FOR EMS

Cyber Essentials KAMI VANIEA 2

Proven LANDesk Solutions

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Building A Secure Microsoft Exchange Continuity Appliance

Is Your Vendor CJIS-Certified?

Avaya Identity Engines Portfolio

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Introduction to Cyber Security / Information Security

Mobile Device Management

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

Agenda , Palo Alto Networks. Confidential and Proprietary.

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Transcription:

BOMGAR BOMGAR AT WILLIAMSON CO Barrett Elkins Regional Sales Manager Public Central US Richard Semple Director Service Desk, GIS, Public Safety 1

Quick Agenda 1. Introductions 2. Williamson County Background and Challenges 3. Bomgar Market Insight and Overview 4. Wilco Usage and performance 5. Bomgar Remote Support Demonstration 6. Q & A Bomgar Solutions Engineers: Tony Wenzel Doug Patel 2

Williamson County Profile Part of the Austin Metropolitan area ~500,000 residents 1,134 sq. mi. with 13 incorporated cities 1,750 Full and part-time staff ~1,600 PCs supported (350 mobile units) 100 ipads 37 IT Staff 5 Service Desk Staff + 1 Manager 24x7 On-call staff for Public Safety 3

Wilco Challenges Remote support tool was cumbersome No integration with work order system Stand alone for each user Limited user licenses Only used with customer present No vendor access No logging/tracking Not CJIS compliant 4

Criteria for Support Tools Easy to use for customers Easy to use for technicians Integration with work order system Flexible Different Internal users Vendor Access Multi-Platform Support more than just desktops Provide support from mobile devices Compliant with County Security Policy Especially CJIS Established, proven technology 5

REMOTE ACCESS: #1 PATHWAY FOR ATTACKERS Remote access remained the most widely used method of infiltration in 2013. Organizations that use third-party support typically use remote access applications like Terminal Services (teamserv) or Remote Desktop Protocol (RDP), pcanywhere, Virtual Network Client (VNC), LogMeIn or Remote Administrator to access their customers systems. If these utilities are left enabled, attackers can access them as though they are legitimate system administrators. 2014 Global Security Report Trustwave SpiderLabs "The bad guys have continually used remote access login to perpetrate their crimes and breaches against POS and other systems, since they gain the privileges and visibility they need with software like LogMeIn," she says. "It's a huge vulnerability that most enterprises don't currently have enough control over, given their relationships with service providers and contractors. They need to tighten up that glaring hole by enforcing strong user authentication into remote-access facilities into their systems and auditing the access that does take place." July 2014 response to Delaware Restaurant Assoc. Breach Remote access services (e.g., VNC, RDP) continue their rise in prevalence, accounting for 88% of all breaches leveraging hacking techniques more than any other vector. 2013 Data Breach Investigations Report - Verizon Business RISK Team 6

The Paradox of IT Support Only 7% of cost, but 50% of overall perception The camera lens through which customers Judge IT... SOURCE: GARTNER. IT SPENDING AND STAFFING REPORT 2013 7

Bomgar At a Glance Secure Remote Support for the Mobile Enterprise 2 nd Generation Enterprise Technology Only FIPS 140-2, DoD-validated Supports Internal & External Networks Supports Mobile, Servers, Desktops 9,000+ customers in 65+ countries IT Inter-Operability Counties - Galveston - Tarrant - Chambers - Hood - Andrews Cities - San Antonio - Waco - Boerne - Bay City - Bastrop 8

Implementation Box shipped Placed in DMZ Configured for AD Authentication Implemented for Service Desk Implemented for other departments Implemented for vendor access Longest part was creating groups and rights levels 9

Wilco Bomgar Implementation Vendor Access BOMGAR Active Directory Authentication Remot e Office DMZ Firewall Internal Rep Office Computers Mobile User (EMS, Law, Fire) 10

Wilco Usage and Stats Techs can access from anywhere On the go from issued ipads Replacing Remote Desktop for Servers Jump clients installed New KPIs in place as a result of Bomgar Use of remote support vs on-site Satisfaction surveys end users and techs (215 done in Q1) Ticket resolution times Current use 75 Sessions/week average Expected peak: 200 sessions/week 11

Next Generation, Enterprise-Grade Technology Product Highlights 1. Security 2. Mobile Support 3. Inter-Operability 4. Web-Enabled 5. Collaboration Appliance deployed on site Traffic uses SSL encryption & passes through the Bomgar box 6. Manageability Support Reps and End Users Both Make Outbound Connections to the Appliance All Data Encrypted Over Bomgar Connection 12