Jumpoint enables remote access to Windows desktops and servers on remote networks. You can also support switches, routers and other network devices on a remote network through a Jumpoint.

The Jumpoint pushes a temporary BeyondTrust client out to other systems on a network when a remote support session begins. In this way, no pre-installed client is required. Simply install a single Jumpoint on a computer within a local area network to access multiple systems on that network.

Once a Jumpoint has been installed on a remote network, permitted representatives can use the Jumpoint to initiate sessions with Windows computers on that same network, even if those computers are unattended. Additionally, a permitted representative can use Jump to access computers on the same network segment as his or her local system, even without a Jumpoint. Simply browse to and select the system you want to access, enter credentials for that system and begin remote control.

By adding improved authentication, architecture, auditing capabilities and access controls, Jumpoints make other connection types more secure. With Jumpoints, for example, you can route Microsoft Remote Desktop Protocol (RDP) through BeyondTrust.

Integrated Microsoft Remote Desktop Protocol enhances security and enables RDP to work across remote networks without VPN tunnels or open listening ports (such as TCP 3389).

A Jumpoint is required to use Intel vPro support. With Intel vPro, a technician can access a remote desktop or server below the operating system. Power a remote system on or off, reboot to BIOS, reimage, and more.

Jumpoint is also used to enable BeyondTrust’s Jump Zone Proxy capability, which gives off-network support technicians remote access to to systems on isolated networks.

Just configure the Jumpoint to proxy connections for designated systems on the network. Then off-network technicians can support those computers, even if the computers have no internet connection. Administrators determine which ports the Jump Zone Proxy uses and which IP ranges can access it. BeyondTrust can create reports and videos of all support sessions performed.

Tools like Terminal and PuTTy allow for remote shell access to switches, routers and other network devices. But using these tools create security concerns and headaches. How do you audit SSH/Telnet sessions or control user access to enabled systems?

With Jump Clients, vendors can access remote desktops, laptops, POS systems, kiosks and servers, regardless of network location.

Jump Technology is made up of Jump Clients and Jumpoints. Support organizations can use Embassies to manage and report on vendors’ access to Jump Clients and Jumpoints at a very granular level.

Giving vendors access to Jumpoints lets them support Windows systems on remote networks without a pre-installed client. You can also enable vendors to use capabilities that require Jumpoints, such as:

Prefers reduced motion setting detected. Animations will now be reduced as a result.