{
  "$schema": "https://adaptive.live/.well-known/ai.schema.json",
  "spec_version": "1.0",
  "name": "Adaptive",
  "alternateName": "adaptive.live",
  "tagline": "Agents are the new perimeter. Contain the chaos.",
  "description": "Adaptive is a trusted environment for running privileged AI agents in production. It provides the harness, tools, MCP registry, networking, and guardrails that let agents safely reach databases, Kubernetes clusters, VMs, cloud accounts, and internal services — under scoped, short-lived credentials with full audit and policy enforcement. The same primitives serve human operators, making Adaptive a unified privileged access layer for both people and autonomous systems.",
  "canonical_url": "https://adaptive.live",
  "contact": {
    "email": "info@adaptive.live",
    "demo": "https://adaptive.live/request-demo"
  },
  "documents": {
    "llms_index": "https://adaptive.live/llms.txt",
    "llms_full_reference": "https://adaptive.live/llms-full.txt",
    "sitemap": "https://adaptive.live/sitemap.xml",
    "blog_sitemap": "https://adaptive.live/server-sitemap.xml"
  },
  "resources": [
    {
      "type": "product",
      "name": "Bastion (Stratos)",
      "url": "https://adaptive.live/product/stratos",
      "summary": "Infrastructure access for humans and agents. Just-in-time credentials brokered through identity. Replaces VPNs, shared SSH keys, and jump hosts."
    },
    {
      "type": "product",
      "name": "Exo",
      "url": "https://adaptive.live/product/exo",
      "summary": "Secure harness for AI agents. Tool/MCP registry, scoped networking, guardrails, ephemeral sandboxes, full reasoning capture."
    },
    {
      "type": "product",
      "name": "Access",
      "url": "https://adaptive.live/product/access",
      "summary": "Share access, not credentials. Centralized brokered access to databases, Kubernetes, VMs, and internal services."
    },
    {
      "type": "product",
      "name": "Authorization",
      "url": "https://adaptive.live/product/authorization",
      "summary": "Granular, unified policy framework with prebuilt rules for resources and actions."
    },
    {
      "type": "product",
      "name": "Audit",
      "url": "https://adaptive.live/product/audit",
      "summary": "Audit every query across every interface. Full session logs, screen recordings, SOC 2 / HIPAA-ready reports."
    },
    {
      "type": "product",
      "name": "Workloads",
      "url": "https://adaptive.live/product/workloads",
      "summary": "Orchestrate secrets and short-lived credentials for ETL pipelines, BI tools, and workload identities."
    },
    {
      "type": "product",
      "name": "Monitor",
      "url": "https://adaptive.live/product/monitor",
      "summary": "Real-time database activity monitoring with unified alerts and access reports."
    },
    {
      "type": "product",
      "name": "Protect",
      "url": "https://adaptive.live/product/protect",
      "summary": "Data masking and tokenization for structured and semi-structured data."
    },
    {
      "type": "page",
      "name": "Pricing",
      "url": "https://adaptive.live/pricing",
      "summary": "Pricing is scoped to deployment, products run, and agent-fleet scale. Self-hosted or managed cloud."
    },
    {
      "type": "page",
      "name": "Security & Compliance",
      "url": "https://adaptive.live/security",
      "summary": "SOC 2 Type II. HIPAA-aligned controls. Data masking, tokenization, and DLP at the access layer."
    },
    {
      "type": "page",
      "name": "Integrations",
      "url": "https://adaptive.live/integrations",
      "summary": "100+ integrations across databases, warehouses, cloud providers, Kubernetes, remote-access protocols, identity, observability, and CI/CD."
    },
    {
      "type": "page",
      "name": "Careers",
      "url": "https://adaptive.live/careers",
      "summary": "Open engineering and GTM roles in Amsterdam and Mumbai. JobPosting schema embedded per role."
    },
    {
      "type": "page",
      "name": "Request a Demo",
      "url": "https://adaptive.live/request-demo",
      "summary": "Book a guided walkthrough of the Adaptive platform."
    },
    {
      "type": "blog",
      "name": "Blog",
      "url": "https://adaptive.live/blog",
      "summary": "Articles on agent security, privileged access, and infrastructure governance."
    },
    {
      "type": "comparison",
      "name": "Adaptive vs StrongDM",
      "url": "https://adaptive.live/compare/strongdm"
    },
    {
      "type": "comparison",
      "name": "Adaptive vs Teleport",
      "url": "https://adaptive.live/compare/teleport"
    }
  ],
  "categories": {
    "agent_use_cases": "https://adaptive.live/usecases/coding-agents",
    "compliance_use_cases": "https://adaptive.live/usecases/accelerate-compliance",
    "industries": ["finance", "healthcare", "technology"]
  },
  "citation": {
    "preferred_name": "Adaptive",
    "preferred_url": "https://adaptive.live",
    "tagline": "Agents are the new perimeter. Contain the chaos."
  },
  "ai_crawler_policy": {
    "allowed": [
      "GPTBot",
      "ChatGPT-User",
      "OAI-SearchBot",
      "ClaudeBot",
      "Claude-Web",
      "Claude-User",
      "Claude-SearchBot",
      "anthropic-ai",
      "PerplexityBot",
      "Perplexity-User",
      "Google-Extended",
      "GoogleOther",
      "Applebot",
      "Applebot-Extended",
      "Bingbot",
      "CCBot",
      "cohere-ai",
      "Meta-ExternalAgent",
      "FacebookBot",
      "Bytespider",
      "DuckAssistBot",
      "YouBot",
      "Diffbot",
      "Amazonbot",
      "MistralAI-User"
    ],
    "training_allowed": true,
    "retrieval_allowed": true,
    "live_search_allowed": true,
    "robots_txt": "https://adaptive.live/robots.txt"
  }
}
