Connecting your resources
As a company,
we understand that maintaining secure
connectivity to our customer's source
code and systems is essential to prevent
unauthorized access,
protect sensitive data,
and maintain operational continuity.
At Fluidattacks
,
we offer three types of connectivity:
Cloud connection - Egress IPs,
and ZTNA.
We will explain below what each of them is about.
Connecting mechanisms
We provide three different approaches in order to do this.
Cloud
The cloud connection acts as an essential and direct bridge to access our users' scope. This connection facilitates a secure, efficient, and ubiquitous way, allowing a smooth and fast interaction with the resources through our platform.
Click here for more information.
We recommend using this method as it is more secure and simple.
Egress IPs
Allows Fluid Attacks
to access your resources
using static public IPs
that you can whitelist on your firewall.
Click here for more information.
ZTNA
Also known as Zero Trust Network Access
.
Allows Fluid Attacks
to access your resources
by installing a pivot agent
within your private network.
Click here for more information.
Additional support
If you require additional support, do not hesitate to contact us.