Skip to main content

Connecting your resources

As a company, we understand that maintaining secure connectivity to our customer's source code and systems is essential to prevent unauthorized access, protect sensitive data, and maintain operational continuity. At Fluidattacks, we offer three types of connectivity: Cloud connection, Egress, and connector.

We will explain below what each of them is about.

Connecting mechanisms

We provide three different approaches in order to do this.

Cloud

The cloud connection acts as an essential and direct bridge to access our users' scope. This connection facilitates a secure, efficient, and ubiquitous way, allowing a smooth and fast interaction with the resources through our platform.

Click here for more information.

Recommended

We recommend using this method as it is more secure and simple.

Egress

Allows Fluid Attacks to access your resources using static public IPs that you can whitelist on your firewall.

Click here for more information.

Connector

Also known as Zero Trust Network Access.

Allows Fluid Attacks to access your resources by installing a pivot agent within your private network.

Click here for more information.

Additional support

If you require additional support, do not hesitate to contact us.