Everything You Need for Secure Access
One unified platform to manage SSH certificates, web terminals, edge connectivity, and compliance — without the complexity.
Web Terminal
Browser-based SSH and Kubernetes Pod Exec. No client installation required. Full xterm.js terminal with session recording and SFTP file management.
- ❯ Browser-based SSH & K8s Pod Exec
- ❯ Session recording in asciinema format
- ❯ Integrated SFTP file manager
- ❯ No client installation required
SSH Certificate Authority
Automated short-lived certificate signing with multi-CA support. Eliminate long-lived SSH keys and reduce your attack surface with time-bound credentials.
- ❯ Automated short-lived certificate signing
- ❯ Multi-CA support with seamless rotation
- ❯ Eliminates long-lived SSH key management
- ❯ One-time cert verification for connections
Edge Agent
Deploy behind NAT and firewalls with zero inbound rules. Reverse WebSocket tunnels with automatic reconnection, heartbeat monitoring, and self-update.
- ❯ Reverse WebSocket tunnel through NAT
- ❯ Zero inbound firewall rules needed
- ❯ Automatic reconnection with backoff
- ❯ Self-update and systemd integration
TCP / SSH Tunneling
Securely forward ports for databases, Redis, RDP, VNC and more. Local proxy connections through encrypted tunnels without exposing services.
- ❯ TCP tunnel for databases, Redis, VNC
- ❯ SSH tunnel through jump hosts
- ❯ Local proxy with encrypted channel
- ❯ Auto-connect and tunnel management
Desktop Application
Native cross-platform app with multi-tab SSH terminal, dual-pane SFTP file manager, tunnel management, and OS keychain credential storage.
- ❯ Cross-platform: macOS, Linux, Windows
- ❯ Multi-tab terminal with split panes
- ❯ Dual-pane SFTP file manager
- ❯ OS keychain credential storage
Role-Based Access Control
Hybrid permission model with shared and personal connections. Granular role assignments, immediate access revocation, and admin approval workflows.
- ❯ Shared and personal connections
- ❯ Role-based connection assignments
- ❯ Immediate access revocation
- ❯ Admin approval workflows
Audit & Compliance
Non-tamperable audit logs with GeoIP, device fingerprinting, and session recording. Complete visibility for ISO-27001 compliance requirements.
- ❯ GeoIP and device fingerprinting
- ❯ Non-tamperable audit logs
- ❯ Login alerts for new IP/device
- ❯ ISO-27001 aligned controls
Session Recording
Record and replay terminal sessions in asciinema format. Quota management, searchable audit trails, and complete non-repudiation.
- ❯ Asciinema format recording
- ❯ Quota management per user
- ❯ Searchable session history
- ❯ Complete non-repudiation
Ready to Secure Your Infrastructure?
Start with our free Community edition or request a personalized demo from our team.