SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Supporting your Remote Clients with
             Bomgar
              Presented by:

              Peter Nowak
      Manager of OIS Client Services
          School of Medicine

                Tom Gray
               IT Manager
              CIDD/TEACCH
What makes Bomgar different?


  • Hardware based on-sight appliance

  • Technician license vs. Client license.

  • Supports Most platforms.


  • Remotely reboot into safe mode with networking.

  • Reboot with cached credentials.
Various Methods to Initiate a session


 Client Initiated:           Technician Initiated:
    • Customizable Web         • Email link
      Portal                   • Session key
      • School of Medicine
                               • Jump Client
        Support Page
      • CIDD/TEACCHE
        Support Page
    • Bomgar Button
    • Click to Chat
Why Bomgar?


    • Deciding Factors for OIS:
      – Remote reboot in safe mode with
        networking.
      – Remote reboot with cached credentials.
      – Remedy integration
      – Session Recording
      – Scripting
      – Click to chat
Why Bomgar?   (continued)



    • Deciding Factors for CIDD/TEACCH:
      – HIPAA/Security
      – License Model.
      – The variety of devices/operating systems
        it supports.
      – Jump Client
      – Multi Sessions
Remote Demo 1:
iPhone Remote Support:


 • iPhone Remote Support
   – Remotely configure email account & VPN
   – Device inventory



                           Just
                        Announced
iOS Remote Support:
Android Remote Support
Remote Demo 2
Training Uses


 • Technicians demonstrate to the user
   remotely how to perform a task
 • Other Technicians can observe remote
   sessions to obtain knowledge.
 • Recorded sessions can be published
   online for training purposes.
Remote Demo 1:
Reporting


 • Reports on:
   – Representative sessions
   – Team Sessions
   – By Date Range


 • Quality Control:
   – Generates Customer surveys.
   – Session Recording for later evaluation.
Remote Demo 3
Questions

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact Sheet
 
Dsi intro
Dsi introDsi intro
Dsi intro
 
SOVA security management
SOVA security managementSOVA security management
SOVA security management
 
PCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to knowPCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to know
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Modern Access Control Systems
Modern Access Control SystemsModern Access Control Systems
Modern Access Control Systems
 
Access Control Software
Access Control SoftwareAccess Control Software
Access Control Software
 
Vision Box: Simplified multi-camera quality inspection
Vision Box: Simplified multi-camera quality inspectionVision Box: Simplified multi-camera quality inspection
Vision Box: Simplified multi-camera quality inspection
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Covid -19 - Work from home Solutions
Covid -19 - Work from home SolutionsCovid -19 - Work from home Solutions
Covid -19 - Work from home Solutions
 
Visual transaction signing solution
Visual transaction signing solutionVisual transaction signing solution
Visual transaction signing solution
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Security Systems for Law Offices
Security Systems for Law Offices Security Systems for Law Offices
Security Systems for Law Offices
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor Neutrality
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Check cashing mobile solution
Check cashing mobile solutionCheck cashing mobile solution
Check cashing mobile solution
 
Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924
 
EdgeWallFlyer2016
EdgeWallFlyer2016EdgeWallFlyer2016
EdgeWallFlyer2016
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
 
Enterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsEnterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra Infosystems
 

Ähnlich wie Supporting your remote clients with bomgar

Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
Rachid ZINE
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
CODE BLUE
 

Ähnlich wie Supporting your remote clients with bomgar (20)

Provisioning Q and A
Provisioning Q and AProvisioning Q and A
Provisioning Q and A
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
 
Mobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless FutureMobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless Future
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
Sales Presentation on WYSE Biometrics System.
Sales Presentation on WYSE Biometrics System.Sales Presentation on WYSE Biometrics System.
Sales Presentation on WYSE Biometrics System.
 
Biometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric SystemBiometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric System
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
pc_access_remote_control_presentation1.ppt
pc_access_remote_control_presentation1.pptpc_access_remote_control_presentation1.ppt
pc_access_remote_control_presentation1.ppt
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Mobile Device Mismanagement
Mobile Device MismanagementMobile Device Mismanagement
Mobile Device Mismanagement
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 
First Time Video Conferencing
First Time Video ConferencingFirst Time Video Conferencing
First Time Video Conferencing
 
TechTalk: Getting to Know Perfecto
TechTalk: Getting to Know PerfectoTechTalk: Getting to Know Perfecto
TechTalk: Getting to Know Perfecto
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 

Mehr von Gary Wilhelm

Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Gary Wilhelm
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
Gary Wilhelm
 
Using Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementUsing Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data Management
Gary Wilhelm
 

Mehr von Gary Wilhelm (14)

Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations
 
Go go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff useGo go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff use
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
 
Using Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementUsing Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data Management
 
Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative
 
IPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have ToIPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have To
 
After the Breach
After the BreachAfter the Breach
After the Breach
 
Virtualization and you: where are we?
Virtualization and you: where are we?Virtualization and you: where are we?
Virtualization and you: where are we?
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright Education
 
Increasing Utilization of Software Site Licenses
Increasing Utilization of Software Site LicensesIncreasing Utilization of Software Site Licenses
Increasing Utilization of Software Site Licenses
 
Leveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of ContactLeveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of Contact
 
Building Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CHBuilding Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CH
 
Network Attached Storage Initiative
Network Attached Storage InitiativeNetwork Attached Storage Initiative
Network Attached Storage Initiative
 
S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)
 

Kürzlich hochgeladen

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Supporting your remote clients with bomgar

  • 1. Supporting your Remote Clients with Bomgar Presented by: Peter Nowak Manager of OIS Client Services School of Medicine Tom Gray IT Manager CIDD/TEACCH
  • 2. What makes Bomgar different? • Hardware based on-sight appliance • Technician license vs. Client license. • Supports Most platforms. • Remotely reboot into safe mode with networking. • Reboot with cached credentials.
  • 3. Various Methods to Initiate a session Client Initiated: Technician Initiated: • Customizable Web • Email link Portal • Session key • School of Medicine • Jump Client Support Page • CIDD/TEACCHE Support Page • Bomgar Button • Click to Chat
  • 4. Why Bomgar? • Deciding Factors for OIS: – Remote reboot in safe mode with networking. – Remote reboot with cached credentials. – Remedy integration – Session Recording – Scripting – Click to chat
  • 5. Why Bomgar? (continued) • Deciding Factors for CIDD/TEACCH: – HIPAA/Security – License Model. – The variety of devices/operating systems it supports. – Jump Client – Multi Sessions
  • 7. iPhone Remote Support: • iPhone Remote Support – Remotely configure email account & VPN – Device inventory Just Announced
  • 11. Training Uses • Technicians demonstrate to the user remotely how to perform a task • Other Technicians can observe remote sessions to obtain knowledge. • Recorded sessions can be published online for training purposes.
  • 13. Reporting • Reports on: – Representative sessions – Team Sessions – By Date Range • Quality Control: – Generates Customer surveys. – Session Recording for later evaluation.

Hinweis der Redaktion

  1. Setup Notes:Open CIDD Support Site, OIS Support SiteDownload ReportSetup Projector,
  2. Show the 2 support sites:
  3. Client Initiated thru support.med.unc.eduKickoff a Virus ScanShow the menu option for Reboot/ Safe Mode w/ Networking, or Cached Credentials.
  4. Machine has multiple monitorsWorks behind firewallsAutomatic reconnect (Server DHCP Example)Show System Information page
  5. Client Initiated thru support.med.unc.eduKickoff a Virus ScanShow the menu option for Reboot/ Safe Mode w/ Networking, or Cached Credentials.
  6. Machine has multiple monitorsWorks behind firewallsAutomatic reconnect (Server DHCP Example)Show System Information page