Home
Product
Use Cases
Integrations
Blog
Get Started
Sign In
Get Started
Get Started
Categories
All
General
Bits and Breaches
Company
Tutorial
Blog
General ⋅
4 min read
How DAM evolved into DDR?
An exploration into how the traditional model of Database Activity Monitoring (DAM) has evolved into a more comprehensive and versatile model, Data Detection and Response (DDR), due to the increasing complexity of data security across multi-cloud environments.
Chinmay Shrivastava ⋅ Dec 6, 2023
General ⋅
8 min read
Structure in Unstructured data: Using AI for Data Security
In 2023, organizations globally are expected to generate over 73,000 exabytes of unstructured data - data that is not explicitly structured. ML and AI models can efficiently go through large amounts of information and identify underlying patterns in the unstructured data as well to deliver greater business value.
Chinmay Shrivastava ⋅ Nov 28, 2023
General ⋅
5 min read
Why do you need Active Monitoring with Zero Trust?
Zero Trust treats external and internal users as potential malicious actors, requiring authentication at each step, and limits lateral movement in the network.
Chinmay Shrivastava ⋅ Nov 16, 2023
General ⋅
8 min read
What is DSPM and how is it different from DAM?
DSPM focuses on securing sensitive data stored in the cloud, whereas DAM safeguards all types of data within an organization, not just data stored in cloud.
Chinmay Shrivastava ⋅ Nov 14, 2023
General ⋅
13 min read
What is Network Access Control (NAC)?
Network Access Control is an approach used to manage and regulate access to network infrastructure to ensure that only authorized users access the network.
Akhilesh Katkar ⋅ Nov 8, 2023
General ⋅
9 min read
What is Sensitive Data and Why it needs to be Regulated?
Sensitive Data is any information that must be protected from unauthorized access to safeguard an individual or an organization.
Chinmay Shrivastava ⋅ Oct 26, 2023
Tutorial ⋅
4 min read
How to view SSH logs?
SSH logs help find out who is trying to access your Linux SSH servers and this article explains how you can view the SSH logs.
Himanshu Garg ⋅ Sep 1, 2023
General ⋅
9 min read
Why the world needs to rethink Infrastructure Access?
Understanding the tailwinds of what makes modern day infrastructure access complex and how we need to rethink the infra access strategies to manage it.
Ronak Massand ⋅ Aug 14, 2023
Company ⋅
2 min read
Adaptive has completed SOC2 Type II audit
Adaptive is excited to announce that we've completed our System and Organization Controls (SOC) 2 Type II Audit.
Debarshi Basak ⋅ Jul 18, 2023
Bits and Breaches ⋅
6 min read
Bits and Breaches - Sony Pictures
Breaking down the infamous Sony Pictures breach from 2014 - how a red skull took down the complete Sony Pictures infrastructure.
Ronak Massand ⋅ Jul 12, 2023
Bits and Breaches ⋅
4 min read
Bits and Breaches - Target Data Breach 2013
Dissecting the famous Target 2013 breach - how a refrigeration and HVAC vendor cost the retail giant over $200 illion.
Ronak Massand ⋅ Jun 22, 2023
General ⋅
8 min read
Evolution of Internal Networking and Access
Understand the evolution of Networking and Access within organizations and adoption of advanced networking solutions for remote work.
Debarshi Basak ⋅ Jun 15, 2023
General ⋅
6 min read
Understanding SOX Compliance: Benefits and Challenges
SOX is a compliance standard introduced with the aim of protecting common investors from any malicious practices by publicly-listed corporations.
Akhilesh Katkar ⋅ Jun 9, 2023
Tutorial ⋅
6 min read
Getting started with Kubernetes in Docker (Kind)
Kind or Kubernetes inside Docker is a tool for running local Kubernetes clusters using lightweight Docker container “nodes” used for local development, testing, and prototyping.
Neeraj Nabar ⋅ May 23, 2023
Tutorial ⋅
6 min read
How to SSH into Docker Container?
The blog explains 3 ways to SSH into Docker containers - using the Docker exec, via SSH, and via another Docker container.
Ratin ⋅ May 19, 2023
Company ⋅
2 min read
Adaptive has completed SOC 2 Type I Audit
At Adaptive Automation Technologies, we are proud to announce that we have achieved SOC 2 Type I compliance in accordance with AICPA standards for SOC.
Debarshi Basak ⋅ Apr 12, 2023
General ⋅
5 min read
Privileged Identity Management (PIM): A Brief Guide
Privileged Identity Management enables organizations to manage who can access what resources within an organization such as DBs, servers, and SSH keys.
Himanshu Garg ⋅ Apr 6, 2023
General ⋅
6 min read
What is the Principle of Least Privilege (POLP)?
Principle of Least Privilege is a concept based on limiting a user's access only to minimum resources required for a task to eliminate unauthorized access.
Neeraj Nabar ⋅ Mar 16, 2023
General ⋅
8 min read
HIPAA Compliance Checklist 2023: The 8-step Easy Guide
The HIPAA Compliance Checklist 2023 is an 8-step easy guide to help organizations achieve HIPAA compliance and safeguard the privacy and security of PHI.
Akhilesh Katkar ⋅ Mar 10, 2023
Tutorial ⋅
9 min read
7 Alternative Use Cases for a Bastion Host
Alternate Use cases for a Bastion Host are VPN alternative, authentication gateway, file transfers, share credentials, intrusion detection, software, etc
Debarshi Basak ⋅ Mar 3, 2023
General ⋅
7 min read
Identity and Access Management (IAM) explained
Identity & Access Management is a framework ensuring only authorized individuals in an org have access to resources needed to carry out their responsibilities.
Debarshi Basak ⋅ Feb 14, 2023
General ⋅
7 min read
Understanding SOC 2: Types, Principles and Benefits
SOC 2 compliance is important to all businesses for data privacy, security and also assuring their customers about safeguarding their confidential information.
Ronak Massand ⋅ Feb 8, 2023
General ⋅
9 min read
Credential Management explained: Best Practices
Credential management is a process of creating, storing, and using digital credentials and certificates, to authenticate and authorize users or devices.
Ratin ⋅ Jan 25, 2023
General ⋅
6 min read
Authentication Protocols: Types and Uses
Authentication protocols define contents of the authentication data, its mode of transfer, and the communication between a server and a client in the network.
Ronak Massand ⋅ Jan 15, 2023
Tutorial ⋅
5 min read
How to set up an AWS Bastion host or a Jump server
A Bastion Host is a dedicated computer used to access an infrastructure resource and helps compartmentalize the downstream resources.
Himanshu Garg ⋅ Jan 10, 2023
Setup in 5 Mins
A new paradigm for Infrastructure Access Management
Agentless Architecture
Zero Network Reconfiguration
Deploy in Cloud or On-Prem
Get Started
Secure infrastructure access management for fast-moving teams
|
SOC2 Type II
Product
Share Access, not Credentials
Zero Trust Network Access
Granular Authorization
Auditability
Custom Access Policies
Use Cases
Protect PII + PHI
Accelerate Compliance
Just-In-Time Access
VPN Alternative
Industries
Finance
Healthcare
Technology
Blog
All
General
Bits and Breaches
Company
Tutorial
Legal
Privacy Policy
Terms & Conditions
Security
© 2023 Adaptive Automation Technologies, Inc.