Hi [[ session.user.profile.firstName ]]

Bomgar Tech Support Series

  • Date
  • Rating
  • Views
  • What the MFA?! Moving Beyond Passwords What the MFA?! Moving Beyond Passwords Stacy Blaiss (Director of Product Marketing), Tal Guest (Senior Product Manager) Recorded: Sep 8 2016 41 mins
    Despite the rise of credential theft via phishing attacks and cyber-breaches, passwords alone are still the most common form of protection for employee accounts; many of which are used to gain access to sensitive data and systems. Not only are passwords often static, too easy to guess, and prone to theft, it’s also difficult to verify who is actually using them. These security issues with passwords are bringing two factor authentication to the spotlight, which enable a second security check beyond user name and password. Implementing this extra layer of security not only protects sensitive data and critical systems, but also verifies the user is who they say they are. This webinar will feature expert insight into multi-factor authentication technology and how organizations can shore up their security practices to better protect their networks and privileged accounts.
  • Screen Sharing Worth 1000 Chats Screen Sharing Worth 1000 Chats Donald Hasson Recorded: Aug 23 2016 38 mins
    Chat is an excellent channel to improve service desk productivity, but when dealing with complex issues, it’s sometimes not enough. If your chat solution is implemented in a standalone silo, then customers may have to transfer to phone support when their issues go beyond the point of text, resulting in a disjointed customer experience. But if the chat transitions directly into a screen-sharing session, the support agent can instantly see and resolve the issue while maintaining a seamless conversation. This session will outline how to increase the value and power of chat through integrating it with other solutions such as remote support, knowledge bases, CRM and more. Turn your service desk into a one-stop-shop with a modern, integrated approach to support.
  • Prevent Security Risks of Third Parties through Managing Privileged Access Prevent Security Risks of Third Parties through Managing Privileged Access Karl Lankford, Stacy Blaiss Recorded: Aug 5 2016 29 mins
    Increasingly, high-profile data breaches are tracked to compromised third-parties or privileged accounts, which is often the attack pathway taken by cyber criminals. Privileged account credentials with connections to valuable systems give hackers access to critical systems without triggering any alarms, making those people and roles ideal targets. This webinar will offer insight into results from Bomgar’s groundbreaking research on why third-party vulnerabilities exist, and offer solutions for what companies can do to increase their security posture and mitigate the threat from third-party access.
  • Control The Access, Control The Asset Control The Access, Control The Asset Joe Schorr, Chris Clarkson Recorded: Apr 12 2016 57 mins
    An increasing number of high-profile data breaches are being traced back to compromised third-parties. Cybercriminals know that many companies have poor policies and technology in place to manage vendor access to their network. If a hacker takes advantage of vendor vulnerabilities and accesses your network disguised as a legitimate third-party, they typically have weeks or months to move around and gain access to critical systems. This webinar will feature a live hack that will show step by step how cyber criminals gain footholds into your network and ultimately infiltrate sensitive systems. You will also hear results from groundbreaking research on why vendor vulnerabilities exist, and offer solutions for what companies can do to increase their security posture and mitigate the threat from third-party access.
  • Learn How UNC Health Care Improved Efficiency of Customer Support Learn How UNC Health Care Improved Efficiency of Customer Support Mike Sell and Brian Page (Bomgar), David Martinez (HEAT), Annette Davis (UNC Health Care) Recorded: Mar 9 2016 59 mins
    The service desk continually invests time and money into solutions that can more efficiently track issues and resolve end-user requests. One key element in service desk support success is integrations, specifically between remote support and ticketing systems. Your remote support software should fit seamlessly into your environment and increase your return on those investments. Bomgar offers pre-built integrations for the leading service desk, CRM, and systems management solutions, including an integration with HEAT Software. This webinar will feature an in depth look at the integration from solutions experts from both Bomgar and Heat, as well as implementation success from UNC Healthcare. Attendees will gain exclusive insight the value and benefits that service desks can expect to see from both the Bomgar and HEAT software solutions, as well as the integration between the two products.
  • The Demise of Passwords and the Rise of Authentication Technologies The Demise of Passwords and the Rise of Authentication Technologies Sam Elliott (Bomgar), Andras Cser (Forreter) Recorded: Feb 23 2016 47 mins
    Cyberattacks dominated the news in 2015, and it’s likely that 2016 will be no different. Cyber criminals are relentless in their efforts to find and take advantage of security weaknesses, which often include privileged user credentials. As computing processing power continues to increase, it’s becoming possible to break even the most complex passwords, putting every organization at risk of devastating breaches. Rather than requiring customers and employees to memorize 20-character, non-dictionary passwords, security and risk professionals need to start plotting the demise of the password and improving the security of privileged accounts. This webcast will highlight the technologies, such as privileged access and account management tools, best suited for securing your most sensitive systems and data.
  • Managing Privileged Access Hacking Threats Managing Privileged Access Hacking Threats Joe Schorr Recorded: Jan 19 2016 43 mins
    Privileged access is a game of managing risk, and breaches leveraging privileged access exploits will solidify as the ‘attack of choice’ this year. Privileged account credentials with connections to valuable systems give hackers access to critical systems without triggering any alarms, making those people and roles the ideal target for hackers. It’s no wonder that we’ve seen this particular attack vector utilized time and time again, and beyond that, outside third-parties and vendors with privileged access are particularly juicy targets because they often use legacy access methods like tunneling that create unrestricted and unmonitored attack footholds on a network.

    Effectively controlling and monitoring privileged access is central to an effective defense in depth strategy. This webinar will offer insight into how to mitigate cybercrime risks and create a winning network protection strategy.
  • Bomgar InSight Bomgar InSight Bomgar Video Recorded: Dec 9 2015 2 mins
    Bomgar now offers remote camera sharing for iOS and Android. Watch this short video to learn more!
  • Top Tips for Vendor Management Top Tips for Vendor Management Joe Schorr Recorded: Dec 3 2015 29 mins
    IT professionals have a lot to think about. They are called upon to be both technologists and strategists, guiding their organizations through the technology frontier and driving new business. That being said, choosing tools to better manage security can be a stressful decision. Among security issues, vendor access and third party management has surfaced as a major vulnerability. High-profile data breaches, such as the Target hack, have made evident that giving vendors access to your internal network through methods like VPN are not secure for managing, monitoring and controlling their access. This leaves IT professionals wondering “what are my vendors doing?” This webcast will offer a checklist as a guide to help IT professionals make informed decisions about solutions that will facilitate secure connections and ultimately, secure vendor management.
  • What is Bomgar Privileged Access Management? What is Bomgar Privileged Access Management? Bomgar Video Recorded: Nov 20 2015 3 mins
    Bomgar Privileged Access Management enables security professionals to control, monitor and manage access to critical systems by privileged users and third-party vendors. Check out this short video to learn more!