Twingate
206 FOLLOWERS
The latest news, announcements, and other content, where we discuss Twingate, Zero Trust Network Access, and the future of network security.
Twingate
1y ago
We’re excited to announce that the Twingate Labs team has launched WebDeploy for DigitalOcean. DigitalOcean is a cloud provider that offers Virtual Machines (droplets) across 8 geographic regions. Twingate users can instantly provision a Connector in DigitalOcean without any scripting knowledge. These Droplets are firewalled off, making them completely invisible to the Internet and they’re set to automatically apply Linux and Twingate updates and reboot when necessary. High-Availability and failover is easy too - deploy a 2nd connector in a different datacenter!
As a modern, secure alternativ ..read more
Twingate
1y ago
What is Azure VPN?
Microsoft Azure VPN Gateway (or Azure VPN for short) is a managed service offered by Microsoft that allows organizations to establish secure connections between devices and private networks over the public internet. Azure VPN is offered as an easier way to deploy a VPN for use with Azure virtual networks (VNs) than having to manually manage the procurement, installation, configuration, and operation of VPN server software.
Although Azure VPN may be technically easier to implement than a traditional VPN, the way Microsoft prices Azure VPN is complex. Azure VPN’s pricing is d ..read more
Twingate
1y ago
ConductorOne <> Twingate
One of the chief benefits of adopting a zero trust strategy is that users are not over-privileged - but as organizations scale, provisioning access to resources can turn into a deluge of IT tickets that cause a bottleneck. Twingate values frictionless, intuitive workflows, so we’ve partnered with ConductorOne to help our users achieve Just-in-Time, ephemeral access in a way that is efficient and secure.
With Twingate, you can already create granular access policies based on factors like user, device, and sensitivity of resources. Now, with the ConductorOne integ ..read more
Twingate
1y ago
NextDNS + Twingate
Twingate is excited to announce our partnership with NextDNS. Earlier this year, we launched Secure DNS, adding an extra layer of protection for end users (and helping CISOs sleep better at night).
We’d made the conscious choice with our architecture to optimize for performance, sending traffic that doesn’t need to be encrypted over the public internet instead. We knew a gap existed with this modern approach - while it’s faster, it left DNS queries hanging out as an easy attack vector. Even the savviest of users could be vulnerable - your traveling CEO, hopping on airport W ..read more
Twingate
1y ago
Featuring:
Paul Guthrie - Information Security Officer
Matthew Jackson - Security Operations and Architecture Manager
Challenges When Matthew Jackson, Security Operations and Architecture Manager, first joined Blend, there were about 100 employees. At that time, the Blend security team knew everyone at the company. However, as the company grew, both Blend’s headcount and number of applications scaled considerably. The security team increasingly ran into requests from new Blend employees seeking access or existing employees requesting applications the security team was not familiar with. It ..read more
Twingate
1y ago
Featuring:
Paul Guthrie - Information Security Officer
Matthew Jackson - Security Operations and Architecture Manager
Transcript:
Paul Guthrie: Well, I joined Blend when it was, I think about 400 people. Matt, how many people when you joined?
Matt Jackson: About a hundred I’d say.
Paul Guthrie: Yeah. So when you’re a hundred people, the security team knows, does person A need access to application B and you can make those decisions. As you grow past about 3-400 people, we start getting into situations where somebody says, I need access to X and we’ve never heard of this employee, nor have ..read more
Twingate
1y ago
Twingate is now also available in the AWS Marketplace so organizations can obtain Twingate directly through AWS and benefit from simplified procurement and billing. Along with this update we’re also pleased to announce that our AWS customers have even more choice to manage their Zero Trust access controls. Administrators can use our AWS CloudWatch Lambda integration to both define resources and manage access directly from the AWS Management Console with AWS Resource Tags.
Twingate is a Zero Trust Remote Access solution that makes it easy for network administrators to provide secure fine-grain ..read more
Twingate
1y ago
How to Use WebAuthn for Stronger Authentication on the Web
Web Authentication (WebAuthn) APIs promise to make security on the web easier for users, developers, and administrators by eliminating passwords and their many security limitations. Users can stop dealing with complex, hard-to-remember passwords. Businesses can stop protecting password databases and implement more robust authentication techniques.
This overview of WebAuthn will explain how this industry standard works, its advantages over other authentication approaches, and some of the challenges WebAuthn still faces on the path to a ..read more
Twingate
1y ago
Today, we’re excited to announce the new Opal + Twingate integration! Opal makes it easy for companies to implement least privilege while improving productivity.
Trusted by forward thinking enterprises, such as Blend, Marqeta, and Databricks, Opal is a modern solution for identity governance and privileged access management. Employees can easily use Opal’s permissions catalog to make self-service requests or generate auto-expiring credentials for cloud infrastructure. Admins can configure powerful security and governance policies on critical resources. Deployed without agents or proxies, Opal ..read more
Twingate
1y ago
Traditional access control systems were designed for employees on managed devices. Today’s blended workforces, however, force administrators to manage a shifting mix of employees and contractors who could be anywhere in the world. Securing contractor access is a particular concern for DevOps teams. Supply chain attacks are accelerating which makes developers primary targets for credential theft.
We will look at why cybercriminals are ramping up supply chain attacks, how credential theft puts DevOps teams at risk, and how legacy VPN technologies make the situation worse. Fortunately, the moder ..read more