Author: [Your Name/Affiliation] Date: April 14, 2026 Abstract Remote support tools are essential for modern IT operations, yet their very design—enabling rapid, privileged access across networks—introduces unique lateral movement risks. This paper examines the concept of the “Bomgar Jump,” a colloquial term for using a Bomgar/BeyondTrust representative console as a pivot point to access additional systems beyond the initially targeted endpoint. We analyze the technical mechanism, security implications, detection challenges, and mitigation strategies associated with this technique. Our findings indicate that without strict session isolation and jump restrictions, a compromised support session can escalate into a full network breach. 1. Introduction Bomgar (now BeyondTrust Remote Support) is a widely deployed privileged access management solution. Its architecture typically involves an appliance (physical or virtual) that mediates sessions between a support representative and an endpoint. A lesser-documented but operationally common practice is the “Bomgar Jump” — where a technician, after connecting to a primary host (e.g., a user’s laptop), uses that host as a springboard to reach another internal system (e.g., a server or database).