Access our demo library to view BeyondTrust products in action.
Learn More Learn MoreComplete your PAM journey with detailed guidance, hands-on capability checklists, and more.
Learn More Learn MoreLearn why Gartner® has named BeyondTrust as a PAM Leader once again.
Learn More Learn MoreWatch the replays from our 2023 conference now!
Learn More Learn MoreOffering a wide array of services and benefits tailored to your specific needs
Learn More Learn MoreLearn how BeyondTrust solutions protect companies from cyber threats.
Learn More Learn MoreWhat can we help you with?
, –pm with Tal Guest, Senior Director of Product Management
As more hardware is virtualized or moved into the cloud, the number one attack vector continues to be exploiting the various remote access paths into these environments. It is no revelation that many organizations today often still run a patch work of desperate bastion host splattered throughout their infrastructure and datacenters for remote access. As organizations expand to their infrastructure into multi-cloud environments so does the need to standardize on how these environments are remotely accessed. What if we told you there is a simple and more secure way to not only standardize on a single bastion host solution for all your environments but also do so in a Zero Trust framework.
Watch this on-demand webinar to learn how Privileged Remote Access can implement a standardized Zero Trust remote access model coupled with industry leading PAM capabilities. BeyondTrust mitigate threats from privileged attack vectors and credential-based attacks all while allowing you to extend remote access to important assets in the cloud or any datacenter in the world.
Covered are:
Tal Guest is a Director of Product Management with over 20 years of industry experience. He directs a group of product managers, responsible for expanding privileged access management core capabilities in the areas of remote access and the service desk. Tal also helps establish long-term business strategies based on current/future market conditions and problems faced in the privileged access management area of cybersecurity.
Chris Herrin is the Senior Product Manager for Privileged Remote Access and all third-party integrations for the BeyondTrust portfolio. He has been with BeyondTrust (Bomgar) for the last five years, beginning his career on the Sales Development and Solutions Engineering teams. Chris is an active Georgia Bulldogs fan, and has to mention his corgis in every presentation he is a part of.
George Pradel is a highly experienced Sr. Solutions Engineer based in Denver, Colorado, with over 35 years of expertise in the IT industry. He obtained the CISSP certification in 2004, demonstrating his deep interest in security tools, which have now become commonplace. George's extensive experience in various fields, including Healthcare, Financial, Insurance, Manufacturing, Utilities, and Food Service, enables him to offer a practical approach in his presentations, making them relevant to attendees. George has presented at various prestigious events such as Citrix's first worldwide conference and was a featured presenter multiple times at VMWorld Europe and VMWorld US. He was also a sought-after speaker at VMUG's across the country, thanks to his ability to deliver information that attendees can immediately put into practice.
After graduating from NIU, George pursued a self-taught path in IT that has led him to work with prominent companies such as Citrix, VMWare, Vizioncore, Quest Software, Dell, Sauce Labs, and BeyondTrust. Notably, George was the 11th Systems Engineer globally for Citrix and was among the first 600 employees at VMWare, where he was recognized as SE of the year. Throughout his career, George has played pivotal roles ranging from an individual contributor to running teams of SEs globally and serving as a Sr. Director at Quest Software.
According to George, ignoring the realities of users when selecting and designing security solutions is not a viable option. His philosophy is rooted in the belief that effective security must take into account the needs and behaviors of users. To illustrate his point, George adopts a storytelling approach that resonates with everyone. He draws on his personal experiences, such as his early career as a 3rd level support engineer on the McDonald's helpdesk, to emphasize the importance of balancing technology with psychology when working with end users.
One lesser-known fact about George is that he began his career as a Video Producer/Director of Computer Instructional Videos. In this role, his primary task was to simplify complex technical concepts and communicate them effectively to viewers. This experience has greatly influenced George's unique approach to presenting and has enabled him to deliver information in a way that is both informative and easily understandable.