Adaptive Logo
Adaptive Logo
Get Started
Blog
Adaptive Logo
Company2 min read
Adaptive has completed SOC2 Type II audit
Adaptive is excited to announce that we've completed our System and Organization Controls (SOC) 2 Type II Audit.
Debarshi BasakJul 18, 2023
Adaptive Logo
Bits and Breaches6 min read
Bits and Breaches - Sony Pictures
Breaking down the infamous Sony Pictures breach from 2014 - how a red skull took down the complete Sony Pictures infrastructure.
Ronak MassandJul 12, 2023
Adaptive Logo
Bits and Breaches4 min read
Bits and Breaches - Target Data Breach 2013
Dissecting the famous Target 2013 breach - how a refrigeration and HVAC vendor cost the retail giant over $200 illion.
Ronak MassandJun 22, 2023
Adaptive Logo
General8 min read
Evolution of Internal Networking and Access in Organizations
Understand the evolution of Networking and Access within organizations and adoption of advanced networking solutions for remote work.
Debarshi BasakJun 15, 2023
Adaptive Logo
General6 min read
Understanding SOX Compliance - Cost, Benefits, and Challenges
SOX is a compliance standard introduced with the aim of protecting common investors from any malicious practices by publicly-listed corporations.
Akhilesh KatkarJun 9, 2023
Adaptive Logo
Tutorial6 min read
Getting started with Kubernetes in Docker (Kind)
Kind or Kubernetes inside Docker is a tool for running local Kubernetes clusters using lightweight Docker container “nodes” used for local development, testing, and prototyping.
Neeraj NabarMay 23, 2023
Adaptive Logo
Tutorial6 min read
How to SSH into Docker Container?
The blog explains 3 ways to SSH into Docker containers - using the Docker exec, via SSH, and via another Docker container.
RatinMay 19, 2023
Adaptive Logo
Company2 min read
Adaptive has completed SOC 2 Type I Audit
At Adaptive Automation Technologies, we are proud to announce that we have achieved SOC 2 Type I compliance in accordance with AICPA standards for SOC.
Debarshi BasakApr 12, 2023
Adaptive Logo
General5 min read
Privileged Identity Management (PIM): A Brief Guide
Privileged Identity Management (PIM) enables organizations to manage who (identity) can access what resources within an organization such as databases, servers, and SSH keys.
Himanshu GargApr 6, 2023
Adaptive Logo
General6 min read
What is the Principle of Least Privilege (POLP)?
Principle of Least Privilege (PoLP) is a concept based on Least Privilege - limiting a user's access only to the minimum resources required for a task to eliminate unauthorized access.
Neeraj NabarMar 16, 2023
Adaptive Logo
General8 min read
HIPAA Compliance Checklist 2023: The 8-step Easy Guide
The HIPAA Compliance Checklist 2023 is an 8-step easy guide to help organizations achieve HIPAA compliance and safeguard the privacy and security of PHI.
Akhilesh KatkarMar 10, 2023
Adaptive Logo
Tutorial9 min read
7 Alternative Use Cases for a Bastion Host
Use cases for a Bastion Host are acting as a VPN alternative, authentication gateway, file transfers, share credentials, intrusion detection, software inventory management, etc
Debarshi BasakMar 3, 2023
Adaptive Logo
General7 min read
Identity and Access Management (IAM) explained
Identity and Access Management is a framework that ensures only authorized individuals in an org have access to the resources they need to carry out their responsibilities.
Debarshi BasakFeb 14, 2023
Adaptive Logo
General7 min read
Understanding SOC 2: Types, Principles and Benefits
SOC 2 compliance is important to all businesses for data privacy, security and also assuring their customers about safeguarding their confidential information.
Ronak MassandFeb 8, 2023
Adaptive Logo
General9 min read
Credential Management explained: Best Practices and the Future
Credential management is a process of creating, storing, and using digital credentials and security certificates, to authenticate and authorize users, devices, systems etc
RatinJan 25, 2023
Adaptive Logo
General6 min read
Authentication Protocols: Types and Uses
Authentication protocols define the contents of the authentication data, its mode of transfer, and the communication between a server and a client in the network.
Ronak MassandJan 15, 2023
Adaptive Logo
Tutorial5 min read
How to set up an AWS Bastion host or a Jump server
A Bastion Host is a dedicated computer used to access an infrastructure resource and helps compartmentalize the downstream resources.
Himanshu GargJan 10, 2023
Setup in 5 Mins
A new paradigm for Infrastructure Access Management
Agentless Architecture
Zero Network Reconfiguration
Deploy in Cloud or On-Prem