Administrators can determine which support technicians or groups can use Jump Technology, and which remote networks they can access. They can set expiration dates on Jumpoints, too.
Ultimately, technicians can only access remote systems if they know the login credentials on the individual systems themselves.
Remote Access without Holes in Your Firewall
Typically, locked-down networks can only be supported by local technicians. But this creates problems for the support organization.
Isolated networks require onsite visits which delay incident resolution and raise costs. And local technicians often use LAN-based tools [VNC, RDP], which lack the audit logging or access control required for security. This undermines the reason the network was locked-down in the first place!
When technicians use legacy remote control tools or go onsite for support, your support organization loses visibility into the support process and risks compromising data security.
With Jump Zone Proxy, support technicians can access locked-down systems that were previously inaccessible to off-network technicians.
Because BeyondTrust integrates with identity management protocols, the centralized access control and detailed audit trail used for all remote support sessions also applies to those that take place on remote isolated networks.