What can we help you with?

Jump™ Zone Proxy Enables Remote Access to Computers on Isolated Networks

Network Diagram: Jump Zone Proxy (Isolated LAN)
Network Diagram: Jump Zone Proxy (Isolated LAN)

Jump Zone Proxy gives off-network support technicians remote access to systems on isolated networks.

Some networks are configured to restrict systems from accessing outside resources such as the internet. To support systems on these networks, Jumpoints can be configured to proxy connections for designated Jump Clients on that restricted network. In this configuration, traffic is allowed only from the end system to the BeyondTrust appliance through the use of the secure Jump Zone Proxy.

Administrators determine which ports the Jump Zone Proxy uses and which IP ranges can access it. BeyondTrust can create reports and videos of all support sessions performed.

More Secure than VNC, RDP or Other Legacy Remote Access Tools

Set up a Jump Zone Proxy Server
Set up a Jump Zone Proxy Server

Administrators can determine which support technicians or groups can use Jump Technology, and which remote networks they can access. They can set expiration dates on Jumpoints, too.

Ultimately, technicians can only access remote systems if they know the login credentials on the individual systems themselves.

Remote Access without Holes in Your Firewall

Typically, locked-down networks can only be supported by local technicians. But this creates problems for the support organization.

Isolated networks require onsite visits which delay incident resolution and raise costs. And local technicians often use LAN-based tools [VNC, RDP], which lack the audit logging or access control required for security. This undermines the reason the network was locked-down in the first place!

When technicians use legacy remote control tools or go onsite for support, your support organization loses visibility into the support process and risks compromising data security.

With Jump Zone Proxy, support technicians can access locked-down systems that were previously inaccessible to off-network technicians.

Because BeyondTrust integrates with identity management protocols, the centralized access control and detailed audit trail used for all remote support sessions also applies to those that take place on remote isolated networks.