How Jump Technology Works: Unattended Access to Remote Systems
With Bomgar Jump Technology, a support representative can access and control remote, unattended computers in any network. Jump Technology is integral to Bomgar support. Because Bomgar is licensed per active representative and not per remote system, Jump Technology is a cost-effective way to reach every device in your enterprise.
Not every support scenario has a customer at his or her computer. You can use Bomgar Jump Technology in two different ways, depending on your needs for unattended support. Use a Jump Client where the network may not be known or, if your unattended support needs are defined within a network, a Jumpoint is an effective solution. Read about the possibilities and configuration details for Jump Clients and Jumpoints in the Bomgar technical documentation library.
Deploy a Jump Client if you need:
- Unattended access to Windows, Mac and Linux computers, regardless of network location.
- Stronger management capacities and the control of installing a persistent, secure active or passive remote access client.
Privileged representatives may deploy Jump Clients dynamically from their representative console or download a mass deployable Jump Client from the /login administrative interface. The Jump Client is pinned to a
Deploy a Jumpoint if you need:
- To troubleshoot all Windows systems in a network without pre-deploying Bomgar clients on each system prior to connecting.
- Access to SSH, Telnet, or vPro systems on that network, like servers, routers, POS systems or ATMs.
- To run Microsoft® Remote Desktop Protocol sessions while maintaining a consistent audit trail.
A Jumpoint acts as a conduit for clientless, unattended access to Windows computers on a known remote network. A single Jumpoint installed on a computer within a local area network is used to access multiple systems, eliminating the need to pre-install software on every computer you may need to access.
Within the local area network, the support representative's computer can initiate a session to a Windows system directly without using a Jumpoint, if appropriate user permissions are enabled. A Jumpoint is needed only when the representative's computer cannot access the target computer directly.