diff --git a/website/content/docs/overview/use-cases.mdx b/website/content/docs/overview/use-cases.mdx index 252f545712..377779724c 100644 --- a/website/content/docs/overview/use-cases.mdx +++ b/website/content/docs/overview/use-cases.mdx @@ -1,7 +1,8 @@ --- layout: docs page_title: Use cases -description: A list of Boundary use cases +description: >- + Learn how HashiCorp Boundary can help you with zero trust access, multi-cloud access, single-sign on with integrated secrets management, and session monitoring. --- # Use cases diff --git a/website/content/docs/overview/vs/bastion-hosts.mdx b/website/content/docs/overview/vs/bastion-hosts.mdx index bd314f684d..4fbdd193ab 100644 --- a/website/content/docs/overview/vs/bastion-hosts.mdx +++ b/website/content/docs/overview/vs/bastion-hosts.mdx @@ -1,7 +1,8 @@ --- layout: docs page_title: Boundary vs. bastion hosts -description: Compares Boundary to bastion hosts +description: >- + Learn how Boundary compares to bastion hosts by providing tightly controlled, just-in-time access to infrastructure using role-based access controls (RBAC). --- # Boundary vs. bastion hosts diff --git a/website/content/docs/overview/vs/other-software.mdx b/website/content/docs/overview/vs/other-software.mdx index f47b69c6c3..9bf6130c04 100644 --- a/website/content/docs/overview/vs/other-software.mdx +++ b/website/content/docs/overview/vs/other-software.mdx @@ -1,7 +1,8 @@ --- layout: docs page_title: Boundary vs. other software -description: Compares Boundary to other security technologies +description: >- + Learn how HashiCorp Boundary compares to other security technologies. --- # Boundary vs. other software diff --git a/website/content/docs/overview/vs/pam.mdx b/website/content/docs/overview/vs/pam.mdx index 4d34797475..fbb05ed3e8 100644 --- a/website/content/docs/overview/vs/pam.mdx +++ b/website/content/docs/overview/vs/pam.mdx @@ -1,7 +1,8 @@ --- layout: docs page_title: Boundary vs. privileged access management -description: Compares Boundary to using a privileged access management (PAM) solution +description: >- + Learn how Boundary compares to privileged access management (PAM) solutions by providing automation for user and credential management and service discovery. --- # Boundary vs. privileged access management diff --git a/website/content/docs/overview/vs/sdp.mdx b/website/content/docs/overview/vs/sdp.mdx index dc1689a730..6b8d27a2a7 100644 --- a/website/content/docs/overview/vs/sdp.mdx +++ b/website/content/docs/overview/vs/sdp.mdx @@ -1,7 +1,8 @@ --- layout: docs page_title: Boundary vs. software-defined perimeter -description: Compares Boundary to using a software-defined perimeter solution +description: >- + Learn how Boundary compares to software-defined perimeter (SDP) tools using dynamic credentials, context-based access, automated host discovery, and auditing. --- # Boundary vs. software-defined perimeter diff --git a/website/content/docs/overview/vs/secrets-management.mdx b/website/content/docs/overview/vs/secrets-management.mdx index dbf8f27132..e9d0010ece 100644 --- a/website/content/docs/overview/vs/secrets-management.mdx +++ b/website/content/docs/overview/vs/secrets-management.mdx @@ -1,7 +1,8 @@ --- layout: docs page_title: Boundary vs. secrets management tools (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, etc.) -description: Compares Boundary to using secrets management tools (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, etc.) +description: >- + Learn how Boundary compares to secrets management tools and how it can compliment them to provide identity-based access, automated host discovery, and auditing. --- # Boundary vs. secrets management tools (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, etc.) diff --git a/website/content/docs/overview/vs/vpn.mdx b/website/content/docs/overview/vs/vpn.mdx index 40ea8f06c3..4d5fd60a2e 100644 --- a/website/content/docs/overview/vs/vpn.mdx +++ b/website/content/docs/overview/vs/vpn.mdx @@ -1,7 +1,8 @@ --- layout: docs page_title: Boundary vs. VPNs -description: Compares Boundary to using a virtual private network (VPN) +description: >- + Learn how Boundary compares to VPNs by using an Identity Provider (IdP) to grant users remote access to specific permitted services, but not the entire network. --- # Boundary vs. VPNs diff --git a/website/content/docs/overview/vs/zero-trust.mdx b/website/content/docs/overview/vs/zero-trust.mdx index 7c8f2aa449..51168f9b66 100644 --- a/website/content/docs/overview/vs/zero-trust.mdx +++ b/website/content/docs/overview/vs/zero-trust.mdx @@ -1,7 +1,8 @@ --- layout: docs page_title: Boundary and zero trust -description: Describes how Boundary applies to a zero trust security approach +description: >- + Learn how Boundary enables a zero trust approach to security in which all access transactions are authenticated and authorized based on trusted identity. --- # Boundary and zero trust diff --git a/website/content/docs/overview/what-is-boundary.mdx b/website/content/docs/overview/what-is-boundary.mdx index d3d6a27d44..d2f7a454e8 100644 --- a/website/content/docs/overview/what-is-boundary.mdx +++ b/website/content/docs/overview/what-is-boundary.mdx @@ -1,7 +1,8 @@ --- layout: docs page_title: What is Boundary? -description: An introduction to Boundary +description: >- + HashiCorp Boundary is a secure remote access solution that you can use to configure least-privileged, just-in-time access to systems, services, and applications. --- # What is Boundary?