A secure, intermediary server used by IT administrators to access and manage devices in a separate security zone, reducing direct exposure of critical systems to potential attackers.