SlideShare una empresa de Scribd logo
1 de 15
Supporting your Remote Clients with
             Bomgar
              Presented by:

              Peter Nowak
      Manager of OIS Client Services
          School of Medicine

                Tom Gray
               IT Manager
              CIDD/TEACCH
What makes Bomgar different?


  • Hardware based on-sight appliance

  • Technician license vs. Client license.

  • Supports Most platforms.


  • Remotely reboot into safe mode with networking.

  • Reboot with cached credentials.
Various Methods to Initiate a session


 Client Initiated:           Technician Initiated:
    • Customizable Web         • Email link
      Portal                   • Session key
      • School of Medicine
                               • Jump Client
        Support Page
      • CIDD/TEACCHE
        Support Page
    • Bomgar Button
    • Click to Chat
Why Bomgar?


    • Deciding Factors for OIS:
      – Remote reboot in safe mode with
        networking.
      – Remote reboot with cached credentials.
      – Remedy integration
      – Session Recording
      – Scripting
      – Click to chat
Why Bomgar?   (continued)



    • Deciding Factors for CIDD/TEACCH:
      – HIPAA/Security
      – License Model.
      – The variety of devices/operating systems
        it supports.
      – Jump Client
      – Multi Sessions
Remote Demo 1:
iPhone Remote Support:


 • iPhone Remote Support
   – Remotely configure email account & VPN
   – Device inventory



                           Just
                        Announced
iOS Remote Support:
Android Remote Support
Remote Demo 2
Training Uses


 • Technicians demonstrate to the user
   remotely how to perform a task
 • Other Technicians can observe remote
   sessions to obtain knowledge.
 • Recorded sessions can be published
   online for training purposes.
Remote Demo 1:
Reporting


 • Reports on:
   – Representative sessions
   – Team Sessions
   – By Date Range


 • Quality Control:
   – Generates Customer surveys.
   – Session Recording for later evaluation.
Remote Demo 3
Questions

Más contenido relacionado

La actualidad más candente

AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG Technologies
 
SOVA security management
SOVA security managementSOVA security management
SOVA security managementSOVA Systems
 
PCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to knowPCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to knowBarry Shteiman
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Modern Access Control Systems
Modern Access Control SystemsModern Access Control Systems
Modern Access Control SystemsThomas P. Johnson
 
Access Control Software
Access Control SoftwareAccess Control Software
Access Control SoftwareBadgePass
 
Vision Box: Simplified multi-camera quality inspection
Vision Box: Simplified multi-camera quality inspectionVision Box: Simplified multi-camera quality inspection
Vision Box: Simplified multi-camera quality inspectionKurt Buttress
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Covid -19 - Work from home Solutions
Covid -19 - Work from home SolutionsCovid -19 - Work from home Solutions
Covid -19 - Work from home SolutionsTariqueKhan55
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
Security Systems for Law Offices
Security Systems for Law Offices Security Systems for Law Offices
Security Systems for Law Offices Thomas P. Johnson
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor NeutralityVandana Verma
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Solarwinds N-able
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...NetwayClub
 
Enterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsEnterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsLyra Infosystems Pvt. Ltd
 

La actualidad más candente (20)

AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact Sheet
 
Dsi intro
Dsi introDsi intro
Dsi intro
 
SOVA security management
SOVA security managementSOVA security management
SOVA security management
 
PCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to knowPCI-DSS v3.0 - What you need to know
PCI-DSS v3.0 - What you need to know
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Modern Access Control Systems
Modern Access Control SystemsModern Access Control Systems
Modern Access Control Systems
 
Access Control Software
Access Control SoftwareAccess Control Software
Access Control Software
 
Vision Box: Simplified multi-camera quality inspection
Vision Box: Simplified multi-camera quality inspectionVision Box: Simplified multi-camera quality inspection
Vision Box: Simplified multi-camera quality inspection
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Covid -19 - Work from home Solutions
Covid -19 - Work from home SolutionsCovid -19 - Work from home Solutions
Covid -19 - Work from home Solutions
 
Visual transaction signing solution
Visual transaction signing solutionVisual transaction signing solution
Visual transaction signing solution
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Security Systems for Law Offices
Security Systems for Law Offices Security Systems for Law Offices
Security Systems for Law Offices
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor Neutrality
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Check cashing mobile solution
Check cashing mobile solutionCheck cashing mobile solution
Check cashing mobile solution
 
Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924Build recurring revenue from reactive customers 20140924
Build recurring revenue from reactive customers 20140924
 
EdgeWallFlyer2016
EdgeWallFlyer2016EdgeWallFlyer2016
EdgeWallFlyer2016
 
Strong authentication for your organization in a cost effective cloud-based...
Strong authentication for  your organization in a cost  effective cloud-based...Strong authentication for  your organization in a cost  effective cloud-based...
Strong authentication for your organization in a cost effective cloud-based...
 
Enterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra InfosystemsEnterprise Remote Support Datasheet - Lyra Infosystems
Enterprise Remote Support Datasheet - Lyra Infosystems
 

Similar a Supporting your remote clients with bomgar

Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UCRachid ZINE
 
Mobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless FutureMobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless FutureForgeRock Identity Tech Talks
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
Sales Presentation on WYSE Biometrics System.
Sales Presentation on WYSE Biometrics System.Sales Presentation on WYSE Biometrics System.
Sales Presentation on WYSE Biometrics System.WYSE BIO
 
Biometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric SystemBiometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric SystemWYSE BIO
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 
pc_access_remote_control_presentation1.ppt
pc_access_remote_control_presentation1.pptpc_access_remote_control_presentation1.ppt
pc_access_remote_control_presentation1.pptKowsalyaJayakumar2
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
Mobile Device Mismanagement
Mobile Device MismanagementMobile Device Mismanagement
Mobile Device Mismanagementbreenmachine
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoTPaul Fremantle
 
First Time Video Conferencing
First Time Video ConferencingFirst Time Video Conferencing
First Time Video ConferencingPaul Richards
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 

Similar a Supporting your remote clients with bomgar (20)

Provisioning Q and A
Provisioning Q and AProvisioning Q and A
Provisioning Q and A
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
 
Mobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless FutureMobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless Future
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
Sales Presentation on WYSE Biometrics System.
Sales Presentation on WYSE Biometrics System.Sales Presentation on WYSE Biometrics System.
Sales Presentation on WYSE Biometrics System.
 
Biometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric SystemBiometric Products By WYSE Biometric System
Biometric Products By WYSE Biometric System
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
pc_access_remote_control_presentation1.ppt
pc_access_remote_control_presentation1.pptpc_access_remote_control_presentation1.ppt
pc_access_remote_control_presentation1.ppt
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Mobile Device Mismanagement
Mobile Device MismanagementMobile Device Mismanagement
Mobile Device Mismanagement
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 
First Time Video Conferencing
First Time Video ConferencingFirst Time Video Conferencing
First Time Video Conferencing
 
TechTalk: Getting to Know Perfecto
TechTalk: Getting to Know PerfectoTechTalk: Getting to Know Perfecto
TechTalk: Getting to Know Perfecto
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 

Más de Gary Wilhelm

Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Gary Wilhelm
 
Go go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff useGo go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff useGary Wilhelm
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management Gary Wilhelm
 
Using Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementUsing Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementGary Wilhelm
 
Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative Gary Wilhelm
 
IPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have ToIPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have ToGary Wilhelm
 
Virtualization and you: where are we?
Virtualization and you: where are we?Virtualization and you: where are we?
Virtualization and you: where are we?Gary Wilhelm
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright EducationGary Wilhelm
 
Increasing Utilization of Software Site Licenses
Increasing Utilization of Software Site LicensesIncreasing Utilization of Software Site Licenses
Increasing Utilization of Software Site LicensesGary Wilhelm
 
Leveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of ContactLeveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of ContactGary Wilhelm
 
Building Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CHBuilding Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CHGary Wilhelm
 
Network Attached Storage Initiative
Network Attached Storage InitiativeNetwork Attached Storage Initiative
Network Attached Storage InitiativeGary Wilhelm
 
S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)Gary Wilhelm
 

Más de Gary Wilhelm (14)

Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations
 
Go go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff useGo go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff use
 
Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
 
Using Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementUsing Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data Management
 
Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative
 
IPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have ToIPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have To
 
After the Breach
After the BreachAfter the Breach
After the Breach
 
Virtualization and you: where are we?
Virtualization and you: where are we?Virtualization and you: where are we?
Virtualization and you: where are we?
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright Education
 
Increasing Utilization of Software Site Licenses
Increasing Utilization of Software Site LicensesIncreasing Utilization of Software Site Licenses
Increasing Utilization of Software Site Licenses
 
Leveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of ContactLeveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of Contact
 
Building Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CHBuilding Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CH
 
Network Attached Storage Initiative
Network Attached Storage InitiativeNetwork Attached Storage Initiative
Network Attached Storage Initiative
 
S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)
 

Último

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Último (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Supporting your remote clients with bomgar

  • 1. Supporting your Remote Clients with Bomgar Presented by: Peter Nowak Manager of OIS Client Services School of Medicine Tom Gray IT Manager CIDD/TEACCH
  • 2. What makes Bomgar different? • Hardware based on-sight appliance • Technician license vs. Client license. • Supports Most platforms. • Remotely reboot into safe mode with networking. • Reboot with cached credentials.
  • 3. Various Methods to Initiate a session Client Initiated: Technician Initiated: • Customizable Web • Email link Portal • Session key • School of Medicine • Jump Client Support Page • CIDD/TEACCHE Support Page • Bomgar Button • Click to Chat
  • 4. Why Bomgar? • Deciding Factors for OIS: – Remote reboot in safe mode with networking. – Remote reboot with cached credentials. – Remedy integration – Session Recording – Scripting – Click to chat
  • 5. Why Bomgar? (continued) • Deciding Factors for CIDD/TEACCH: – HIPAA/Security – License Model. – The variety of devices/operating systems it supports. – Jump Client – Multi Sessions
  • 7. iPhone Remote Support: • iPhone Remote Support – Remotely configure email account & VPN – Device inventory Just Announced
  • 11. Training Uses • Technicians demonstrate to the user remotely how to perform a task • Other Technicians can observe remote sessions to obtain knowledge. • Recorded sessions can be published online for training purposes.
  • 13. Reporting • Reports on: – Representative sessions – Team Sessions – By Date Range • Quality Control: – Generates Customer surveys. – Session Recording for later evaluation.

Notas del editor

  1. Setup Notes:Open CIDD Support Site, OIS Support SiteDownload ReportSetup Projector,
  2. Show the 2 support sites:
  3. Client Initiated thru support.med.unc.eduKickoff a Virus ScanShow the menu option for Reboot/ Safe Mode w/ Networking, or Cached Credentials.
  4. Machine has multiple monitorsWorks behind firewallsAutomatic reconnect (Server DHCP Example)Show System Information page
  5. Client Initiated thru support.med.unc.eduKickoff a Virus ScanShow the menu option for Reboot/ Safe Mode w/ Networking, or Cached Credentials.
  6. Machine has multiple monitorsWorks behind firewallsAutomatic reconnect (Server DHCP Example)Show System Information page