Home
Product
Use Cases
Integrations
Blog
Get Started
Sign In
Get Started
Get Started
Categories
All
General
Bits and Breaches
Company
Tutorial
Blog ⋅ Tutorial
Tutorial ⋅
4 min read
How to view SSH logs?
SSH logs help find out who is trying to access your Linux SSH servers and this article explains how you can view the SSH logs.
Himanshu Garg ⋅ Sep 1, 2023
Tutorial ⋅
6 min read
Getting started with Kubernetes in Docker (Kind)
Kind or Kubernetes inside Docker is a tool for running local Kubernetes clusters using lightweight Docker container “nodes” used for local development, testing, and prototyping.
Neeraj Nabar ⋅ May 23, 2023
Tutorial ⋅
6 min read
How to SSH into Docker Container?
The blog explains 3 ways to SSH into Docker containers - using the Docker exec, via SSH, and via another Docker container.
Ratin ⋅ May 19, 2023
Tutorial ⋅
9 min read
7 Alternative Use Cases for a Bastion Host
Alternate Use cases for a Bastion Host are VPN alternative, authentication gateway, file transfers, share credentials, intrusion detection, software, etc
Debarshi Basak ⋅ Mar 3, 2023
Tutorial ⋅
5 min read
How to set up an AWS Bastion host or a Jump server
A Bastion Host is a dedicated computer used to access an infrastructure resource and helps compartmentalize the downstream resources.
Himanshu Garg ⋅ Jan 10, 2023
Enterprise Grade
Prevent Sensitive Data Exposure
Agentless Architecture
Zero Network Reconfiguration
Deploy in the Cloud or On-Prem
Get Started
Protected Data Access Gateway for Your Organization
|
SOC2 Type II
Product
Share Access, not Credentials
Non-Human Data Access
Data Masking and Tokenization
Comprehensive Auditability
Data Classification
Anomaly Detection
Database Activity Monitoring
Use Cases
Mask PII and PHI
Data protection on ETL pipelines
Reduce Insider Threat
Accelerate Privacy Compliance
VPN Alternative
Industries
Finance
Healthcare
Technology
Blog
All
General
Bits and Breaches
Company
Tutorial
Legal
Privacy Policy
Terms & Conditions
Security
© 2024 Adaptive Automation Technologies, Inc.