Static IPs and More with DigitalOcean
Twingate
by Emrul Islam
1y ago
We’re excited to announce that the Twingate Labs team has launched WebDeploy for DigitalOcean. DigitalOcean is a cloud provider that offers Virtual Machines (droplets) across 8 geographic regions. Twingate users can instantly provision a Connector in DigitalOcean without any scripting knowledge. These Droplets are firewalled off, making them completely invisible to the Internet and they’re set to automatically apply Linux and Twingate updates and reboot when necessary. High-Availability and failover is easy too - deploy a 2nd connector in a different datacenter! As a modern, secure alternativ ..read more
Visit website
Demystifying Azure VPN Pricing & Affordable Alternatives
Twingate
by Stuart Loh
1y ago
What is Azure VPN? Microsoft Azure VPN Gateway (or Azure VPN for short) is a managed service offered by Microsoft that allows organizations to establish secure connections between devices and private networks over the public internet. Azure VPN is offered as an easier way to deploy a VPN for use with Azure virtual networks (VNs) than having to manually manage the procurement, installation, configuration, and operation of VPN server software. Although Azure VPN may be technically easier to implement than a traditional VPN, the way Microsoft prices Azure VPN is complex. Azure VPN’s pricing is d ..read more
Visit website
Just-in-Time Access using Twingate + ConductorOne
Twingate
by Shelby Ludtke
1y ago
ConductorOne <> Twingate One of the chief benefits of adopting a zero trust strategy is that users are not over-privileged - but as organizations scale, provisioning access to resources can turn into a deluge of IT tickets that cause a bottleneck. Twingate values frictionless, intuitive workflows, so we’ve partnered with ConductorOne to help our users achieve Just-in-Time, ephemeral access in a way that is efficient and secure. With Twingate, you can already create granular access policies based on factors like user, device, and sensitivity of resources. Now, with the ConductorOne integ ..read more
Visit website
Announcing Twingate's partnership with NextDNS
Twingate
by Shelby Ludtke
1y ago
NextDNS + Twingate Twingate is excited to announce our partnership with NextDNS. Earlier this year, we launched Secure DNS, adding an extra layer of protection for end users (and helping CISOs sleep better at night). We’d made the conscious choice with our architecture to optimize for performance, sending traffic that doesn’t need to be encrypted over the public internet instead. We knew a gap existed with this modern approach - while it’s faster, it left DNS queries hanging out as an easy attack vector. Even the savviest of users could be vulnerable - your traveling CEO, hopping on airport W ..read more
Visit website
How Blend uses Opal and Twingate to implement a holistic Zero Trust strategy
Twingate
by Eugene Ling
1y ago
Featuring: Paul Guthrie - Information Security Officer Matthew Jackson - Security Operations and Architecture Manager Challenges When Matthew Jackson, Security Operations and Architecture Manager, first joined Blend, there were about 100 employees. At that time, the Blend security team knew everyone at the company. However, as the company grew, both Blend’s headcount and number of applications scaled considerably. The security team increasingly ran into requests from new Blend employees seeking access or existing employees requesting applications the security team was not familiar with. It ..read more
Visit website
How Opal and Twingate support Blend
Twingate
by Eugene Ling
1y ago
Featuring: Paul Guthrie - Information Security Officer Matthew Jackson - Security Operations and Architecture Manager Transcript: Paul Guthrie: Well, I joined Blend when it was, I think about 400 people. Matt, how many people when you joined? Matt Jackson: About a hundred I’d say. Paul Guthrie: Yeah. So when you’re a hundred people, the security team knows, does person A need access to application B and you can make those decisions. As you grow past about 3-400 people, we start getting into situations where somebody says, I need access to X and we’ve never heard of this employee, nor have ..read more
Visit website
Announcing Twingate's AWS Marketplace listing and integration
Twingate
by Emrul Islam
1y ago
Twingate is now also available in the AWS Marketplace so organizations can obtain Twingate directly through AWS and benefit from simplified procurement and billing. Along with this update we’re also pleased to announce that our AWS customers have even more choice to manage their Zero Trust access controls. Administrators can use our AWS CloudWatch Lambda integration to both define resources and manage access directly from the AWS Management Console with AWS Resource Tags. Twingate is a Zero Trust Remote Access solution that makes it easy for network administrators to provide secure fine-grain ..read more
Visit website
How to Use WebAuthn for Stronger Authentication on the Web
Twingate
by Paul Andre de Vera
1y ago
How to Use WebAuthn for Stronger Authentication on the Web Web Authentication (WebAuthn) APIs promise to make security on the web easier for users, developers, and administrators by eliminating passwords and their many security limitations. Users can stop dealing with complex, hard-to-remember passwords. Businesses can stop protecting password databases and implement more robust authentication techniques. This overview of WebAuthn will explain how this industry standard works, its advantages over other authentication approaches, and some of the challenges WebAuthn still faces on the path to a ..read more
Visit website
How to implement dynamic access controls with Opal, Okta and Twingate
Twingate
by Emrul Islam
1y ago
Today, we’re excited to announce the new Opal + Twingate integration! Opal makes it easy for companies to implement least privilege while improving productivity. Trusted by forward thinking enterprises, such as Blend, Marqeta, and Databricks, Opal is a modern solution for identity governance and privileged access management. Employees can easily use Opal’s permissions catalog to make self-service requests or generate auto-expiring credentials for cloud infrastructure. Admins can configure powerful security and governance policies on critical resources. Deployed without agents or proxies, Opal ..read more
Visit website
Why Zero Trust Network Access is Necessary for Third-party and Contractor Access
Twingate
by Paul Andre de Vera
1y ago
Traditional access control systems were designed for employees on managed devices. Today’s blended workforces, however, force administrators to manage a shifting mix of employees and contractors who could be anywhere in the world. Securing contractor access is a particular concern for DevOps teams. Supply chain attacks are accelerating which makes developers primary targets for credential theft. We will look at why cybercriminals are ramping up supply chain attacks, how credential theft puts DevOps teams at risk, and how legacy VPN technologies make the situation worse. Fortunately, the moder ..read more
Visit website

Follow Twingate on FeedSpot

Continue with Google
Continue with Apple
OR