SlideShare a Scribd company logo
1 of 18
Download to read offline
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
It’s A Mad, Mad
Mobile World –
Support It Securely!
Donald Hasson l November 16, 2017
• Mobile Support Landscape
• Security Challenges & Risks
• Tools & Solutions
• Customer Case Studies
• Demo
• Q&A
Agenda
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3
Mobile devices are
literally everywhere…
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
How can I support
end users with
mobile devices?
How can I enable my
help desk reps to do
their jobs with mobile
devices?
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
How can I make sure
it’s secure?
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7
• Predominantly break/fix
• Reps in a call center using a
desktop or laptop computer to
provide support using a thick
client
• Low focus on security
Traditional Support
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8
• Security is gaining momentum
• Reps can provide support away
from a physical office, and using
a mobile device with a support
app or browser based support
• 24/7 support
• Expanded end user mobile
support with new iOS screen
sharing for iOS 11
Support Today
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9
• Embedded & Customized App
Support
• Field Support
• Remote Camera Sharing for off
network devices and equipment
Taking it to the next level
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10
Embedded App Support
• Add a “Get Support” feature
right in your app
• Seamlessly initiates a
support session
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11
• Field employees with Internet
connected devices
• Examples: Utilities,
transportation
Field Support
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12
Remote Camera Sharing
• Support truly anything, even off
network equipment or devices
• See what the user sees
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13
Remote Camera Sharing
• Support truly anything, even off
network equipment or devices
• See what the user sees
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14
• Branded support experience
• Recordings
• Audit Trail
• Trust
• Consent for support
And Keep It All Secure, And Accountable
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15
SUPPORT & SERVICE
people and devices
ACCESS & PROTECT
remote systems and
infrastructure
SECURE & DEFEND
credentials and passwords
SECURE ACCESS SOLUTIONS
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
DEMO
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17
• Teamwork Retail Case Study
• Stribling Equipment Case Study
• Bomgar Insight
• Apple iOS Support
• Android Support
• Embedded Remote App Support
• Support Drivers on the Road with Bomgar
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
Additional Resources
©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
QUESTIONS?

More Related Content

More from Bomgar

Privileged Access in Healthcare
Privileged Access in HealthcarePrivileged Access in Healthcare
Privileged Access in HealthcareBomgar
 
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...Bomgar
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowBomgar
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsBomgar
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Bomgar
 
The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and OutThe Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and OutBomgar
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, TooBomgar
 

More from Bomgar (7)

Privileged Access in Healthcare
Privileged Access in HealthcarePrivileged Access in Healthcare
Privileged Access in Healthcare
 
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To Know
 
Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”
 
The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and OutThe Threat is Real: Protect Valuable Systems and Data from the Inside and Out
The Threat is Real: Protect Valuable Systems and Data from the Inside and Out
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

It's A Mad, Mad Mobile World - Support It Securely!

  • 1. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE It’s A Mad, Mad Mobile World – Support It Securely! Donald Hasson l November 16, 2017
  • 2. • Mobile Support Landscape • Security Challenges & Risks • Tools & Solutions • Customer Case Studies • Demo • Q&A Agenda
  • 3. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3 Mobile devices are literally everywhere…
  • 4. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE How can I support end users with mobile devices?
  • 5. How can I enable my help desk reps to do their jobs with mobile devices? ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE
  • 6. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE How can I make sure it’s secure?
  • 7. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7 • Predominantly break/fix • Reps in a call center using a desktop or laptop computer to provide support using a thick client • Low focus on security Traditional Support
  • 8. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8 • Security is gaining momentum • Reps can provide support away from a physical office, and using a mobile device with a support app or browser based support • 24/7 support • Expanded end user mobile support with new iOS screen sharing for iOS 11 Support Today
  • 9. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9 • Embedded & Customized App Support • Field Support • Remote Camera Sharing for off network devices and equipment Taking it to the next level
  • 10. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10 Embedded App Support • Add a “Get Support” feature right in your app • Seamlessly initiates a support session
  • 11. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11 • Field employees with Internet connected devices • Examples: Utilities, transportation Field Support
  • 12. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12 Remote Camera Sharing • Support truly anything, even off network equipment or devices • See what the user sees
  • 13. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13 Remote Camera Sharing • Support truly anything, even off network equipment or devices • See what the user sees
  • 14. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14 • Branded support experience • Recordings • Audit Trail • Trust • Consent for support And Keep It All Secure, And Accountable
  • 15. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15 SUPPORT & SERVICE people and devices ACCESS & PROTECT remote systems and infrastructure SECURE & DEFEND credentials and passwords SECURE ACCESS SOLUTIONS
  • 16. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE DEMO
  • 17. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17 • Teamwork Retail Case Study • Stribling Equipment Case Study • Bomgar Insight • Apple iOS Support • Android Support • Embedded Remote App Support • Support Drivers on the Road with Bomgar ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE Additional Resources
  • 18. ©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18©2017 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE QUESTIONS?