Go Beyond VPN

Keep private resources and internet traffic protected with Zero Trust security tools built for the modern world of work.

Search

FAVORITES

STG Cluster

Prod Cluster

Elastic

Gitlab

Jira

Other Resources

Sign Out

Fri 2:55 PM

Finder

Edit

View

Go

Window

Help

alex – alex@alex-mbp

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

> ssh root@k8s.prod.autoco.int

ssh: connection refused

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

Welcome to Kubernetes v1.21.1!


Type 'help' for a list of commands.


root@prod-cluster:~$

k8s.prod.autoco.int

Twingate

Twingate is trying to verify your identity for k8s.prod.autoco.int.

Touch ID or enter your password

to allow this.

Use Account Password…

Cancel

Prod Cluster

k8s.prod.autoco.int

This device is not authorized to access Prod Cluster.

Dismiss

Learn more

Hardware free

Eliminate challenging deployments and resource intensive maintenance with software-based ZTNA.

Zero trust security

Prevent lateral network traffic, eliminate open inbound ports, and implement the principle of least privilege across your entire network.

Performant & productive

Reduce IT support tickets and improve productivity for end users with best-in-class speed, reliability, and user experience.

  • daniel@autoco.com

    robert@autoco.com

    joris@autoco.com

    anna@autoco.com

    lawrence@autoco.com

    shirley@autoco.com

  • Dell PC

    Samsung Galaxy

    iPhone 14 Pro

    MacBook Air

    MacBook Pro

    iMac M1

  • 160.11.31.92

    192.04.31.93

    134.88.21.81

    100.67.16.81

    173.57.12.83

    102.81.02.45

  • Virtual Machines

    Tableau

    CircleCI

    Salesforce

    Kubernetes

    Jenkins

    On-premise Resources

Location Allowed

Device Verfied

  • 125x5780a24tbvnjsyu8wdktb8632jg8012ckuiam048dmt69vsdy930vyqplmc7328mdi46098fdw125x58w69vsdy930vyqplmc7328mdi46098ff

  • 467bkw35675b8mrew90bk7w8632jg8012ckuiam048dmt69vsdy930vyqplmc7328mdi46098fdw125x58w69vsdy930vyqpa458junbde946098ff6

  • 467bkw35675b8mrew90bk7w8632jg8012ckuiam048dmt69vsdy930vyqplmc7328mdi46098fdw125x58w69vsdy930vyqpa458junbde946098ff6

  • 125x5780a24tbvnjsyu8wdktb8632jg8012ckuiam048dmt69vsdy930vyqplmc7328mdi46098fdw125x58w69vsdy930vyqplmc7328mdi46098ff

Verify access requests before they leave the device

Verify access requests before they leave the device

Verify access requests before they leave the device

If the user isn’t authorized, the device isn’t verified, or the context is suspicious, Twingate doesn’t let the network request leave the device.

The Twingate Zero Trust Platform

The Twingate Zero Trust Platform

The Twingate Zero Trust Platform

Zero Trust Network Access

Remote access built for the modern workforce

Remote access built for the modern workforce

Remotely access the office network, cloud VPCs, and other private resources.

Powerful, automated access controls at the network layer.

Precisely control access based on specific device requirements.

A

Autoco

autoco.twingate.com

Recent Activity

Updated 2 minutes ago

All Activity

Alex Marshall

accessed

Airflow

Show details

2 mins ago

Sadie Kirlin

failed to connect to

Gitlab

Show details

8 mins ago

Joel Thiel

accessed

Prod Cluster

Show details

16 mins ago

Nolan Wright

accessed

Airflow

Show details

34 mins ago

Angela Bower

accessed

Prod Cluster

Show details

48 mins ago

Sadie Kirlin

failed to connect to

Prod DB

Show details

1 hour ago

To view more activity, generate a report.

A

Autoco

autoco.twingate.com

Recent Activity

Updated 2 minutes ago

All Activity

Alex Marshall

accessed

Airflow

Show details

2 mins ago

Sadie Kirlin

failed to connect to

Gitlab

Show details

8 mins ago

Joel Thiel

accessed

Prod Cluster

Show details

16 mins ago

Nolan Wright

accessed

Airflow

Show details

34 mins ago

Angela Bower

accessed

Prod Cluster

Show details

48 mins ago

Sadie Kirlin

failed to connect to

Prod DB

Show details

1 hour ago

To view more activity, generate a report.

Internet Security

Secure internet access from anywhere

Secure internet access from anywhere

Automatically flag, detect, and block malicious web threats.

Proactively block access to inappropriate or unwanted web-based content.

Leverage rich DNS log data to identify trends, reduce risk, and protect your end users.

Blocked Domains

Domains blocked by Security, Privacy, or manually denied.

amazon.com

202

paypal.com

41

facebook.com

22

snapchat.com

17

tiktok.com

10

4 Security Filters Enabled

An extensive set of filtering rules to block ads, trackers, and other risky domains in all countries.

Threat Intelligence Feeds

Cryptojacking Protection

Google Safe Browsing

Typosquatting Protection

Blocked Domains

Domains blocked by Security, Privacy, or manually denied.

amazon.com

202

paypal.com

41

facebook.com

22

snapchat.com

17

tiktok.com

10

4 Security Filters Enabled

An extensive set of filtering rules to block ads, trackers, and other risky domains in all countries.

Threat Intelligence Feeds

Cryptojacking Protection

Google Safe Browsing

Typosquatting Protection

Powerful security deployed in minutes

90%

90%

90%

reduction in deployment time

reduction in deployment time

99.9+%

99.9+%

99.9+%

reliability

reliability

86%

86%

86%

faster than VPN

faster than VPN

  • Bob Bousquet

    Director of IT

    “Twingate had faster speeds than any other solution we evaluated. They make zero trust easy and our users are loving the experience.”

    Luis Zaldivar

    SRE Manager

    “We got set up in literally 30 minutes and Twingate has easily scaled to manage our most complex workflows. Even our engineers love it - and that's a high bar.”

    Emery Wells

    CEO

    “Our old VPN was giving us serious issues and causing flaky Zoom calls with everyone working remotely. It drove me and my team crazy. Twingate couldn't come soon enough.”

    Christian Trummer

    CTO

    “We evaluated several competing vendors for zero trust and Twingate was clearly the easiest to deploy. We got Twingate up in minutes.”

    Paul Guthrie

    Information Security Officer

    “We've invested heavily in automation at Blend and Twingate is a powerful platform that allows us to programmatically deploy and maintain a zero trust approach to our infrastructure.”

  • Cameron Perry

    Staff Site Reliability Engineer

    “I was waiting for the ball to drop, it was almost too easy. Twingate just worked like magic.”

    Neel Palrecha

    CTO

    “WFH made it clear that our old solution wasn't going to scale. We were surprised at how easy it was to get Twingate up, and we're excited to roll it out to the whole company.“

    Joey Benamy

    Senior SRE

    Implementing and managing Twingate is a DevOps engineer's dream. From highly relevant and technical documentation to solid IaC providers… the team at Twingate have made it so easy to deploy and automate Twingate at any scale.

    Stuart Robinson

    CTO & Co-founder

    “When a product works, you don’t notice it — it just works. In the past, I’ve always known about when I’m on VPN because it’s annoying. It’s been very smooth sailing with Twingate. We don’t even notice it.”

    Luis Zaldivar

    SRE Manager

    “We got set up in literally 30 minutes and Twingate has easily scaled to manage our most complex workflows. Even our engineers love it - and that's a high bar.”

    Christian Trummer

    CTO

    “We evaluated several competing vendors for zero trust and Twingate was clearly the easiest to deploy. We got Twingate up in minutes.”

  • andrew-fong

    CEO at Prodvana

    Twingate solved our production access problems in less than a day.

    We were able to get access to different k8s clusters in different VPCs without complex configurations. Getting that time back to focus on development was amazing.

    Twingate helped us set up least privilege access controls in a much more streamlined way than any of us were used to. The sigh of relief when we realized we didn’t need to configure anything else in GCP was palpable. :)

    They need to work on their marketing, but their product is phenomenal. If you are looking to ditch VPNs, check out Twingate.

    mang-git-ng

    CEO at Anvil

    Anvil just implemented Twingate to manage our remote access controls. Best / easiest 15min spent securing our systems.

    ian-calderbank

    Network Architecture Consultant

    Outbound tunnels only, no incoming attack surface exposed, tunnel stitching in their cloud, per device, per user and per application authorisation, integration with common major Identity providers, what's not to like.

    It took me 20 minutes to get it working for a sample SME (myself). Docker to deploy the connector to an on-prem box (a NAS), all autoconfigured once the necessary authorisation keys were pasted in. Microsoft 365 for the identity, Linux packages for the endpoint.

    Job done!

    u-nimajalali

    r/sysadmin contributor

    Twingate has massive flexibility when it comes to routing. You can route by IP or DNS. They even let you get down to the protocol and port level. Mostly overkill but could be useful in a bind with older networks and older systems.

    a-k-singh

    @itsatulkumar

    VPNs were good until Twingate arrived. Such an impressive tool.

    joey-benamy

    SRE, OncoLens

    Implementing and managing Twingate is a devops engineer's dream. From highly relevant and technical documentation to solid IaC providers, Peter Ahn, Tony Huie, Alex M. and the team at Twingate have made it so easy to deploy and automate Twingate at any scale. OncoLens is looking forward to getting more users and resources on Twingate and trying out the upcoming features on the roadmap! #devops #sase #zerotrust

  • alex-bovee

    CEO at ConductorOne

    Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.

    The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.

    All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.

    robbert-r

    @RobbertR1971

    Experimenting with Twingate in combination with a Pi clone. First impression is very good. What a relief compared to the setup of a regular VPN.

    erik-caligo

    ErikCaligo

    I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.

    Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.

    You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.

    frank

    @CompWizard18219

    Twingate works amazing. I use it to access my Plex media server outside of my home network!

    vishal-k-c

    Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |

    to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,

    I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .

    I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.

  • Cameron Perry

    Staff Site Reliability Engineer

    “I was waiting for the ball to drop, it was almost too easy. Twingate just worked like magic.”

    Neel Palrecha

    CTO

    “WFH made it clear that our old solution wasn't going to scale. We were surprised at how easy it was to get Twingate up, and we're excited to roll it out to the whole company.“

    Joey Benamy

    Senior SRE

    Implementing and managing Twingate is a DevOps engineer's dream. From highly relevant and technical documentation to solid IaC providers… the team at Twingate have made it so easy to deploy and automate Twingate at any scale.

    Stuart Robinson

    CTO & Co-founder

    “When a product works, you don’t notice it — it just works. In the past, I’ve always known about when I’m on VPN because it’s annoying. It’s been very smooth sailing with Twingate. We don’t even notice it.”

    Luis Zaldivar

    SRE Manager

    “We got set up in literally 30 minutes and Twingate has easily scaled to manage our most complex workflows. Even our engineers love it - and that's a high bar.”

    Christian Trummer

    CTO

    “We evaluated several competing vendors for zero trust and Twingate was clearly the easiest to deploy. We got Twingate up in minutes.”

  • Bob Bousquet

    Director of IT

    “Twingate had faster speeds than any other solution we evaluated. They make zero trust easy and our users are loving the experience.”

    Luis Zaldivar

    SRE Manager

    “We got set up in literally 30 minutes and Twingate has easily scaled to manage our most complex workflows. Even our engineers love it - and that's a high bar.”

    Emery Wells

    CEO

    “Our old VPN was giving us serious issues and causing flaky Zoom calls with everyone working remotely. It drove me and my team crazy. Twingate couldn't come soon enough.”

    Christian Trummer

    CTO

    “We evaluated several competing vendors for zero trust and Twingate was clearly the easiest to deploy. We got Twingate up in minutes.”

    Paul Guthrie

    Information Security Officer

    “We've invested heavily in automation at Blend and Twingate is a powerful platform that allows us to programmatically deploy and maintain a zero trust approach to our infrastructure.”

  • andrew-fong

    CEO at Prodvana

    Twingate solved our production access problems in less than a day.

    We were able to get access to different k8s clusters in different VPCs without complex configurations. Getting that time back to focus on development was amazing.

    Twingate helped us set up least privilege access controls in a much more streamlined way than any of us were used to. The sigh of relief when we realized we didn’t need to configure anything else in GCP was palpable. :)

    They need to work on their marketing, but their product is phenomenal. If you are looking to ditch VPNs, check out Twingate.

    mang-git-ng

    CEO at Anvil

    Anvil just implemented Twingate to manage our remote access controls. Best / easiest 15min spent securing our systems.

    ian-calderbank

    Network Architecture Consultant

    Outbound tunnels only, no incoming attack surface exposed, tunnel stitching in their cloud, per device, per user and per application authorisation, integration with common major Identity providers, what's not to like.

    It took me 20 minutes to get it working for a sample SME (myself). Docker to deploy the connector to an on-prem box (a NAS), all autoconfigured once the necessary authorisation keys were pasted in. Microsoft 365 for the identity, Linux packages for the endpoint.

    Job done!

    u-nimajalali

    r/sysadmin contributor

    Twingate has massive flexibility when it comes to routing. You can route by IP or DNS. They even let you get down to the protocol and port level. Mostly overkill but could be useful in a bind with older networks and older systems.

    a-k-singh

    @itsatulkumar

    VPNs were good until Twingate arrived. Such an impressive tool.

    joey-benamy

    SRE, OncoLens

    Implementing and managing Twingate is a devops engineer's dream. From highly relevant and technical documentation to solid IaC providers, Peter Ahn, Tony Huie, Alex M. and the team at Twingate have made it so easy to deploy and automate Twingate at any scale. OncoLens is looking forward to getting more users and resources on Twingate and trying out the upcoming features on the roadmap! #devops #sase #zerotrust

  • alex-bovee

    CEO at ConductorOne

    Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.

    The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.

    All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.

    robbert-r

    @RobbertR1971

    Experimenting with Twingate in combination with a Pi clone. First impression is very good. What a relief compared to the setup of a regular VPN.

    erik-caligo

    ErikCaligo

    I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.

    Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.

    You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.

    frank

    @CompWizard18219

    Twingate works amazing. I use it to access my Plex media server outside of my home network!

    vishal-k-c

    Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |

    to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,

    I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .

    I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.

  • Cameron Perry

    Staff Site Reliability Engineer

    “I was waiting for the ball to drop, it was almost too easy. Twingate just worked like magic.”

    Neel Palrecha

    CTO

    “WFH made it clear that our old solution wasn't going to scale. We were surprised at how easy it was to get Twingate up, and we're excited to roll it out to the whole company.“

    Joey Benamy

    Senior SRE

    Implementing and managing Twingate is a DevOps engineer's dream. From highly relevant and technical documentation to solid IaC providers… the team at Twingate have made it so easy to deploy and automate Twingate at any scale.

    Stuart Robinson

    CTO & Co-founder

    “When a product works, you don’t notice it — it just works. In the past, I’ve always known about when I’m on VPN because it’s annoying. It’s been very smooth sailing with Twingate. We don’t even notice it.”

    Luis Zaldivar

    SRE Manager

    “We got set up in literally 30 minutes and Twingate has easily scaled to manage our most complex workflows. Even our engineers love it - and that's a high bar.”

    Christian Trummer

    CTO

    “We evaluated several competing vendors for zero trust and Twingate was clearly the easiest to deploy. We got Twingate up in minutes.”

Zero Trust as Code

Zero Trust as Code

Zero Trust as Code

Automate your journey to Zero Trust

Twingate's API-first design easily integrates with your stack, no changes to infrastructure needed. Just choose your IaC, choose your VPC, and deploy.