Guides, how-tos, and articles covering the latest security concepts.
Inbal Zeligner, Software Engineer at Twingate, walks through her approach to SAML integrations with SPs and IdPs.
Secure Web Gateways (SWGs) can block malware and malicious websites, prevent data exfiltration, and support your organization's Zero Trust Network Access strategy.
SSL VPNs use browser-based protocols to create secure tunnels between a user’s device and an SSL VPN gateway. Learn more about SSL VPNs and how Twingate can help.
Twingate Co-Founder and Chief Product Officer Alex Marshall recently sat down for a DevOps Fireside Chat series with Cameron Seebach, DevOps Engineer and Tech Lead at The Pill Club.
VPN split tunneling can help mitigate some performance and usability issues. Learn more about split tunneling and how Twingate can help.
We explore the difference between Tailscale, a peer-to-peer VPN alternative that creates a virtual mesh network, and Twingate.
We explore the difference between Cloudflare, which has expanded its services to include Secure Access Service Edge (SASE), and Twingate.
An explanation of what an enterprise VPN is, what considerations go into selecting an enterprise VPN, the common risks or failures, and how Zero Trust compares.
We explore the difference between Perimeter 81 VPN and Twingate.
We explore remote access technologies such as VPNs and more modern alternatives.
OpenVPN suffers from the same weaknesses inherent to all VPN technology. We review OpenVPN & explain how Twingate compares.
An explanation of what mesh VPNs are, how they work, and how they differ from traditional VPN solutions.
A walk through of the use cases for private DNS and how a zero trust solution like Twingate can help improve security.
While providing benefits over traditional business VPNs, Cloud VPNs do not address key security issues inherent in VPN design.
DMZs have been valuable elements of traditional network security architectures. As companies move to remote work, more secure solutions exist.
Exposure to the public internet and authentication limitations make bastion hosts an incomplete security solution. Read on to learn why.
Alex Marshall and Lior Rozner walk through how a Zero Trust solution can integrate security and access control into your automated infrastructure management processes.
Despite the benefits of BYOD policies, they open the door for cyberattacks. Learn how to secure BYOD and simplify BYOD management through Zero Trust.
We break down the optimal use cases for TCP vs UDP while also addressing the security vulnerabilities of each. Read on to learn more.
VPNs have several core weaknesses that make them problematic to maintain and a common attack vector for hackers. Read on to learn why.
We explain what are the highest priority security solutions to implement within your organization, including the top vendors in each category.
Sophisticated attackers can use lateral movement techniques to evade detection for months while mapping your network and escalating their access.
A plain English guide to IPsec. We break down how the suite of protocols work, the IPsec VPN use case, and areas where security gaps might occur when using this technology.
A plain language discussion about the security benefits and risks of using IPsec protocol to secure VPN connections. This is the fourth of a series of technical explainers about IPsec.
The old approach to securing corporate networks is failing as business networking becomes more decentralized. In this article, we discuss how SASE fits into the future of network security.
An explanation of why pressure is placed on network architectures in today’s IT environment and a discussion about what architecture decisions matter in modern network design.
Commonly used by many organizations, these technologies make inherent assumptions that expand your organization's attack surface. Read on to understand why and what alternative solutions exist.
An explanation of what IPsec Passthrough and VPN Passthrough are, how they are related, and when they should be used.
A explanation of the benefits and limitations of RDP as a remote access security solution. Topics include how you can help secure your RDP solution in the short-term as well as more modern approaches to securing remote workforces.
An informative explanation of how the IPsec network protocol is used with VPNs, including a step-by-step walkthrough of how to set-up your own IPsec VPN server and client.
An explanation into why SDPs are a better solution for today’s network security challenges and how SDP solutions can simplify the implementation of Zero Trust security within your organization.
A plain English guide to the differences between IPsec tunnel mode and transport mode and when they are used.
A breakdown of AWS Client VPN's complex pricing structure, so you know what you are paying for and what alternative solutions exist
A fireside discussion covering how to best manage today's sophisticated cybersecurity threats at the "network perimeter" and within your organization's network
Transferring and mitigating cybersecurity risk as part of a holistic risk management strategy
Consider these 5 common security risks to keep your RDP users safe
Zero trust is the future, but why isn't it here yet?
Add MFA and SSO to Elastic Stack software without reconfiguring Elastic
A recap of a fireside conversation between security experts
How VPNs create an exposure to the growing threat of ransomware