Guides, how-tos, and articles covering the latest security concepts.
Demystifying Azure VPN Pricing & Affordable Alternatives
Breaking down Azure VPN's complex pricing model
How Google Cloud VPN Pricing Works & Affordable Alternatives
Explaining the complicated pricing model of Google Cloud VPN and other alternatives to consider.
How to Use WebAuthn for Stronger Authentication on the Web
WebAuthn APIs promise to make security on the web easier for users, developers, and administrators by eliminating passwords and their many security limitations. Learn more.
What is Transport Layer Security?
This article will explain the origins of TLS, how it works, and how it can be part of a modern secure access solution.
Should businesses consider WireGuard?
We will introduce WireGuard VPN, discuss its advantages, and explain where certain businesses can benefit from using WireGuard VPN to secure their remote traffic.
What is Cloud Infrastructure Security?
We will help you understand what cloud infrastructure security is, its benefits and challenges, and how Zero Trust solutions like Twingate can reduce your attack surface and make cloud security more efficient.
Inbal explains how to build a SAML service provider using PySAML2
Inbal Zeligner, Software Engineer at Twingate, walks through her approach to SAML integrations with SPs and IdPs.
What is a Secure Web Gateway?
Secure Web Gateways (SWGs) can block malware and malicious websites, prevent data exfiltration, and support your organization's Zero Trust Network Access strategy.
SSL VPN Explained
SSL VPNs use browser-based protocols to create secure tunnels between a user’s device and an SSL VPN gateway. Learn more about SSL VPNs and how Twingate can help.
Pill Club Fireside Chat Recap
Twingate Co-Founder and Chief Product Officer Alex Marshall recently sat down for a DevOps Fireside Chat series with Cameron Seebach, DevOps Engineer and Tech Lead at The Pill Club.
VPN Split Tunneling with Twingate
VPN split tunneling can help mitigate some performance and usability issues. Learn more about split tunneling and how Twingate can help.
What is Tailscale?
We explore the difference between Tailscale, a peer-to-peer VPN alternative that creates a virtual mesh network, and Twingate.
What is Cloudflare VPN?
We explore the difference between Cloudflare, which has expanded its services to include Secure Access Service Edge (SASE), and Twingate.
How to Choose an Enterprise VPN | Twingate
An explanation of what an enterprise VPN is, what considerations go into selecting an enterprise VPN, the common risks or failures, and how Zero Trust compares.
What is Perimeter 81 VPN?
We explore the difference between Perimeter 81 VPN and Twingate.
Remote Access VPN vs. Zero Trust
We explore remote access technologies such as VPNs and more modern alternatives.
What is OpenVPN & Key Limitations
OpenVPN suffers from the same weaknesses inherent to all VPN technology. We review OpenVPN & explain how Twingate compares.
Mesh VPNs & How They Differ from Hub and Spoke VPNs
An explanation of what mesh VPNs are, how they work, and how they differ from traditional VPN solutions.
What is Private DNS & Zero Trust Applications
A walk through of the use cases for private DNS and how a zero trust solution like Twingate can help improve security.
Cloud VPNs: As Brittle, Unsecure as Traditional VPNs
While providing benefits over traditional business VPNs, Cloud VPNs do not address key security issues inherent in VPN design.
DMZ Network: Is It Necessary to Secure Company Resources?
DMZs have been valuable elements of traditional network security architectures. As companies move to remote work, more secure solutions exist.
Bastion Host Servers Explained
Exposure to the public internet and authentication limitations make bastion hosts an incomplete security solution. Read on to learn why.
Webinar Recap: Security and Access Control with Infrastructure as Code
Alex Marshall and Lior Rozner walk through how a Zero Trust solution can integrate security and access control into your automated infrastructure management processes.
Supporting BYOD with Zero Trust Security
Despite the benefits of BYOD policies, they open the door for cyberattacks. Learn how to secure BYOD and simplify BYOD management through Zero Trust.
TCP vs UDP: When to Use Which Protocol
We break down the optimal use cases for TCP vs UDP while also addressing the security vulnerabilities of each. Read on to learn more.
Business VPNs - Recommendations and Alternatives
VPNs have several core weaknesses that make them problematic to maintain and a common attack vector for hackers. Read on to learn why.
The Top 5 Essentials for any Start-Up's Security Stack
We explain what are the highest priority security solutions to implement within your organization, including the top vendors in each category.
Hacking 101: How to Prevent Lateral Movement
Sophisticated attackers can use lateral movement techniques to evade detection for months while mapping your network and escalating their access.
IPsec: The Complete Guide to How It Works and How to Use It
A plain English guide to IPsec. We break down how the suite of protocols work, the IPsec VPN use case, and areas where security gaps might occur when using this technology.
IPsec Encryption: How Secure Is It Really?
A plain language discussion about the security benefits and risks of using IPsec protocol to secure VPN connections. This is the fourth of a series of technical explainers about IPsec.
What does SASE Mean? A No-Frills Guide to Cloud Network Security
The old approach to securing corporate networks is failing as business networking becomes more decentralized. In this article, we discuss how SASE fits into the future of network security.
Network Architecture: A Guide for Modern IT Professionals
An explanation of why pressure is placed on network architectures in today’s IT environment and a discussion about what architecture decisions matter in modern network design.
RDP & VPN: Why These Outdated Solutions Are Still Commonly Used
Commonly used by many organizations, these technologies make inherent assumptions that expand your organization's attack surface. Read on to understand why and what alternative solutions exist.
IPsec Passthrough and VPN Passthrough: What Are They?
An explanation of what IPsec Passthrough and VPN Passthrough are, how they are related, and when they should be used.
What is RDP? Remote Desktop Protocol Explained
A explanation of the benefits and limitations of RDP as a remote access security solution. Topics include how you can help secure your RDP solution in the short-term as well as more modern approaches to securing remote workforces.
IPsec VPNs: What They Are and How to Set Them Up
An informative explanation of how the IPsec network protocol is used with VPNs, including a step-by-step walkthrough of how to set-up your own IPsec VPN server and client.
SDP vs. VPN: Why It’s Time to Move to Software-Defined Perimeters
An explanation into why SDPs are a better solution for today’s network security challenges and how SDP solutions can simplify the implementation of Zero Trust security within your organization.
IPsec Tunnel Mode vs. Transport Mode
A plain English guide to the differences between IPsec tunnel mode and transport mode and when they are used.
The Hidden Cost of AWS VPN and Finding Affordable Alternatives
A breakdown of AWS Client VPN's complex pricing structure, so you know what you are paying for and what alternative solutions exist
Defense in Depth: How to Fight Cybersecurity Threats with ZTNA & EDR
A fireside discussion covering how to best manage today's sophisticated cybersecurity threats at the "network perimeter" and within your organization's network
Managing Cyberattack Risk: An Ounce of Prevention is Worth a Pound of Cure
Transferring and mitigating cybersecurity risk as part of a holistic risk management strategy
Is Your RDP Service Secure?
Consider these 5 common security risks to keep your RDP users safe
Why Isn't Everyone Using Zero Trust Networking?
Zero trust is the future, but why isn't it here yet?
How-To Guide: Prevent an Elasticsearch Server Breach
Add MFA and SSO to Elastic Stack software without reconfiguring Elastic
Securing Your Remote Workforce
A recap of a fireside conversation between security experts