Love from the community

People from around the world are securing their company resources and homelabs with Twingate. Join the conversation & share what you love about Twingate!

Love from the community

People from around the world are securing their company resources and homelabs with Twingate. Join the conversation & share what you love about Twingate!

Love from the community

People from around the world are securing their company resources and homelabs with Twingate. Join the conversation & share what you love about Twingate!

Mike Sheward

Head of Security at Xeal

Don't typically vouch for many security products, but Twingate is one that I do.

Extremely quick to spin up. Have used it on a couple of occasions to lock down privileged access. Also use it as a 'full-service' VPN to protect business travelers. Have also used it to overcome internet restrictions imposed on a manufacturing facility by an unnamed oppressive regime.

Xavier Ruiz

@xav__ie

@TwingateHQ is a tool you should really look into. It has seamlessly replaced reverse tunneling ssh for me. It’s basically a super smart vpn that selectively allows me to connect to my remote server and regular connections go to regular internet.

Jorge Yau

@mopx

It is easier to make a tunnel with Cloudflare or Twingate than to get CableOnda90 to help you.

Avi Pinto

@av1pinto

openVPN renew is up in a week so we (our awesome Daniel) decided to try out Twingate. seems to work seamlessly. And it has a lot more capabilities that we will use going forward. (@ekampf you were the trigger for this. Thanks)

Avi Zurel

@kensodev

A product that completely changed the way we do things at Hippo and made our infrastructure access order of magnitude easier is @TwingateHQ. If you don't know about it, this podcast may explain. We killed 2 old enterprise VPN products. All network routes through Twingate now

Michael Gonzalez

Looking for remote work, Cyber Security; Forensics; Penetration testing

Twingate is the future of VPN!!

dadlord

@brandanw

I've been using it and I quite like it!

Alex Bovee

CEO at ConductorOne

Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.

The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.

All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.

Robbert R.

@RobbertR1971

Experimenting with Twingate in combination with a Pi clone. First impression is very good. What a relief compared to the setup of a regular VPN.

Erik Caligo

ErikCaligo

I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.

Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.

You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.

Frank

@CompWizard18219

Twingate works amazing. I use it to access my Plex media server outside of my home network!

Vishal K C

Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |

to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,

I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .

I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.

Mike Sheward

Head of Security at Xeal

Don't typically vouch for many security products, but Twingate is one that I do.

Extremely quick to spin up. Have used it on a couple of occasions to lock down privileged access. Also use it as a 'full-service' VPN to protect business travelers. Have also used it to overcome internet restrictions imposed on a manufacturing facility by an unnamed oppressive regime.

Xavier Ruiz

@xav__ie

@TwingateHQ is a tool you should really look into. It has seamlessly replaced reverse tunneling ssh for me. It’s basically a super smart vpn that selectively allows me to connect to my remote server and regular connections go to regular internet.

Jorge Yau

@mopx

It is easier to make a tunnel with Cloudflare or Twingate than to get CableOnda90 to help you.

Avi Pinto

@av1pinto

openVPN renew is up in a week so we (our awesome Daniel) decided to try out Twingate. seems to work seamlessly. And it has a lot more capabilities that we will use going forward. (@ekampf you were the trigger for this. Thanks)

Avi Zurel

@kensodev

A product that completely changed the way we do things at Hippo and made our infrastructure access order of magnitude easier is @TwingateHQ. If you don't know about it, this podcast may explain. We killed 2 old enterprise VPN products. All network routes through Twingate now

Michael Gonzalez

Looking for remote work, Cyber Security; Forensics; Penetration testing

Twingate is the future of VPN!!

dadlord

@brandanw

I've been using it and I quite like it!

Alex Bovee

CEO at ConductorOne

Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.

The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.

All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.

Robbert R.

@RobbertR1971

Experimenting with Twingate in combination with a Pi clone. First impression is very good. What a relief compared to the setup of a regular VPN.

Erik Caligo

ErikCaligo

I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.

Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.

You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.

Frank

@CompWizard18219

Twingate works amazing. I use it to access my Plex media server outside of my home network!

Vishal K C

Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |

to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,

I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .

I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.

Brett Bowen

Applying Law Enforcement principles to Cyber Security investigations.

One of my favorite YouTubers (and he's here on LinkedIn as well) is Network Chuck. His videos are always entertaining, informative, and many of his videos give me a good side project to work on. Except when I waste weeks trying to get the Kubernetes cluster working on 4 Raspberry Pi's. Like for real, I don't know what I'm doing wrong, but I have exhausted the search engine results looking for a solution.

Anyway, the latest video helps you set up Twingate. If you don't know Twingate is a remote access solution. I had been using Teleport to access my homelab, but I found with my phone, it doesn't always play nice with switching networks. If I go from the work Wifi to cellular, it may or may not stay connected. I've even had situations where Teleport is stuck trying to connect and I can't seem to force it to disconnect.

Twingate was super easy to set up. I like its emphasis on security, you can authorize only specific devices and users to access it. You can also specify what resources are accessible in the first place and on what port.

Hopefully I'll like it better than Teleport.

#twingate #teleport #networkchuck #cybersecurity

Olajide Claudius-Akinyemi

Cybersecurity Engineer || Network Security Architect || Cloud Security || IT Risk Management and Incident Responder

I don't usually promote products, but I have to say I'm really impressed with Twingate. I was skeptical at first in making use of it in my lab environment and didn't want to mess things up, but it's been a few weeks now and it has exceeded all my expectations. Twingate has really covered all the bases, from connectivity to security in my lab environment. Managing access to my resources has become a breeze, and I am rest assured knowing my remote devices have secure connectivity. Best of all, I don't have to deal with any VPN headaches anymore! If you're in the same boat as I was and looking for a software-defined perimeter solution, give Twingate a try and YES, the free version is more than sufficient for a lab use 😊. #Twingate #SDP #networksecurity #remotework

⚡️Federico

@fedevitaledev

Just finished setting up @TwingateHQ with my homeassistant installation. Mindblowing how easy it has been. Literally 2 mins of setup (+30m to understand how to access HA as root)

Julian Guttzeit

@julianguttzeit

Have now installed @goteleport & @TwingateHQ on our infrastructure + customers. In combination with @linuxnetdata everything is so incredibly hustlefree! Cool!

JR

@anarkia1985

Combining #steamlink from @Steam with @TwingateHQ = secure gaming from anywhere on most devices 🤩🤩🤩

Thanks for making these awesome products.

https://dropintheocean.tech/index.php/2023…

Daniel McConnell

Senior Security Analyst at the University of Pittsburgh

Just wanted to touch on how great it has been to work with our VPN provider Twingate. Twingate allowed us to quickly roll out a VPN solution for a large number of our users spread throughout the world. Utilizing Twingate's SSO abilities, we were able to easily set up a solution that our users were able to access immediately, and we did not have to do any advanced configurations or install any hardware. We loved how easy the setup was of the VPN connectors into our private networks.

We also really loved the ease of use and management of Twingate VPN. When a user needs access, we can easily set them up and put them in a group with access to what they need. Logging in is super quick and simple. We also love the use of MFA to enhance the security of the login process. Previous solutions did not have MFA, nor were they user friendly to set up for a new user. We have loved our Twingate experience and will continue to do so. #zerotrust #twingate #security

KingNickSA

@KingNickSA

We just started looking into Twingate at our company and are liking it so far. We were looking for an alternative to pulse and as luck would have it, NetworkChuck made a video on it not too long ago. https://youtu.be/IYmXPF3XUwo

Ps- it ḍoes support AzureAD and MFA

Mike Doza

@MikeDoza517052

#twingate I cannot say how productive I am now that I am able to access my Nexus containers from my iPhone using #twingate #devsecops is so easy! Do you want to learn how to do it too?! #gitlab #devops #devopscommunity Cloud Underground had taught me so…

AlexDevUwU

@AlexDevUwU

Thanks to NetworkChuck and TwinGate, I now have a very secure and efficient way to access everything I need on my local home network.

Thanks to the video in which he talked about this, I managed to do exactly what I needed and now I can work calmly! :D

u/permitipanyany

r/msp contributor

I like Twingate. Their team and support are the bomb. All I can say is that I was really impressed with the team over there.

DENightOne

Hi All,

Just wanted to leave a short note to tell people about a zero trust remote access service I found that for a non coder like me was extremely easy to set up and configure. Its called Twingate 9 …its almost the same as Tailscale and Zerotier…three things that I find amazing, its very easy to set up and takes a few mintues and secondly its Zero Trust by default…meaning you have to add all your resources that you want to access and you can restrict access by allowing only certain TCP or UDP ports (even disable ICMP). Lastly you can also restict the client side, meaning you can tell it to make sure the client is running Antivirus or that the Client has a lock screen on etc etc… all Policy based.

The best part is that it runs on almost everything… I would love to see someone add the docker install to Home Assistant Community Add-ons as I am not capable of writing a docker add on

Ryan Wright

@TheImmaturedad

Just setup @TwingateHQ on my home network and this ish is as smooth as butter!!

Kaoru Kohashigawa

Lead DevOps Engineer, Benti

Twingate was a breeze to set up with their Pulumi Provider!

We easily spun up Connectors in our VPC and managed team access all through code, saving us from
human error!

Corey Cross

Site Reliability Engineer, ProviderTrust

If you’re in the market for a ZTNA solution or need a better option for remote access, I can’t recommend Twingate enough. We were looking to replace our VPN and decided to go with Twingate. It didn’t have a lot of the useless complexity (that doesn’t actually add security) of other solutions, plus they’ve got out-of-the-box integrations with Okta and Jamf Pro, which were essential for the team.
We hear a lot of marketing fluff around easy implementations, but with Twingate it was dead easy. We had it up and running super quickly, plus the technical implementation of Zero Trust Networking was really solid. One exciting recent win: we were able to use Service accounts to enable our CI Workflows (GitHub Actions) to connect to private resources. That’s been pretty huge. It would’ve been a big, painful undertaking to do this without Twingate.
Twingate is just so easy to use compared to previous solutions, and it keeps getting better.

Joey Benamy

SRE, OncoLens

Implementing and managing Twingate is a devops engineer's dream. From highly relevant and technical documentation to solid IaC providers, Peter Ahn, Tony Huie, Alex M. and the team at Twingate have made it so easy to deploy and automate Twingate at any scale. OncoLens is looking forward to getting more users and resources on Twingate and trying out the upcoming features on the roadmap! #devops #sase #zerotrust

A K SINGH

@itsatulkumar

VPNs were good until Twingate arrived. Such an impressive tool.

u/nimajalali

r/sysadmin contributor

Twingate has massive flexibility when it comes to routing. You can route by IP or DNS. They even let you get down to the protocol and port level. Mostly overkill but could be useful in a bind with older networks and older systems.

Ian Calderbank

Network Architecture Consultant

Outbound tunnels only, no incoming attack surface exposed, tunnel stitching in their cloud, per device, per user and per application authorisation, integration with common major Identity providers, what's not to like.

It took me 20 minutes to get it working for a sample SME (myself). Docker to deploy the connector to an on-prem box (a NAS), all autoconfigured once the necessary authorisation keys were pasted in. Microsoft 365 for the identity, Linux packages for the endpoint.

Job done!

Mang-Git Ng

CEO at Anvil

Anvil just implemented Twingate to manage our remote access controls. Best / easiest 15min spent securing our systems.

Andrew Fong

CEO at Prodvana

Twingate solved our production access problems in less than a day.

We were able to get access to different k8s clusters in different VPCs without complex configurations. Getting that time back to focus on development was amazing.

Twingate helped us set up least privilege access controls in a much more streamlined way than any of us were used to. The sigh of relief when we realized we didn’t need to configure anything else in GCP was palpable. :)

They need to work on their marketing, but their product is phenomenal. If you are looking to ditch VPNs, check out Twingate.

Mike Sheward

Head of Security at Xeal

Don't typically vouch for many security products, but Twingate is one that I do.

Extremely quick to spin up. Have used it on a couple of occasions to lock down privileged access. Also use it as a 'full-service' VPN to protect business travelers. Have also used it to overcome internet restrictions imposed on a manufacturing facility by an unnamed oppressive regime.

Xavier Ruiz

@xav__ie

@TwingateHQ is a tool you should really look into. It has seamlessly replaced reverse tunneling ssh for me. It’s basically a super smart vpn that selectively allows me to connect to my remote server and regular connections go to regular internet.

Jorge Yau

@mopx

It is easier to make a tunnel with Cloudflare or Twingate than to get CableOnda90 to help you.

Avi Pinto

@av1pinto

openVPN renew is up in a week so we (our awesome Daniel) decided to try out Twingate. seems to work seamlessly. And it has a lot more capabilities that we will use going forward. (@ekampf you were the trigger for this. Thanks)

Avi Zurel

@kensodev

A product that completely changed the way we do things at Hippo and made our infrastructure access order of magnitude easier is @TwingateHQ. If you don't know about it, this podcast may explain. We killed 2 old enterprise VPN products. All network routes through Twingate now

Michael Gonzalez

Looking for remote work, Cyber Security; Forensics; Penetration testing

Twingate is the future of VPN!!

dadlord

@brandanw

I've been using it and I quite like it!

Alex Bovee

CEO at ConductorOne

Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.

The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.

All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.

Robbert R.

@RobbertR1971

Experimenting with Twingate in combination with a Pi clone. First impression is very good. What a relief compared to the setup of a regular VPN.

Erik Caligo

ErikCaligo

I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.

Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.

You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.

Frank

@CompWizard18219

Twingate works amazing. I use it to access my Plex media server outside of my home network!

Vishal K C

Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |

to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,

I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .

I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.

Brett Bowen

Applying Law Enforcement principles to Cyber Security investigations.

One of my favorite YouTubers (and he's here on LinkedIn as well) is Network Chuck. His videos are always entertaining, informative, and many of his videos give me a good side project to work on. Except when I waste weeks trying to get the Kubernetes cluster working on 4 Raspberry Pi's. Like for real, I don't know what I'm doing wrong, but I have exhausted the search engine results looking for a solution.

Anyway, the latest video helps you set up Twingate. If you don't know Twingate is a remote access solution. I had been using Teleport to access my homelab, but I found with my phone, it doesn't always play nice with switching networks. If I go from the work Wifi to cellular, it may or may not stay connected. I've even had situations where Teleport is stuck trying to connect and I can't seem to force it to disconnect.

Twingate was super easy to set up. I like its emphasis on security, you can authorize only specific devices and users to access it. You can also specify what resources are accessible in the first place and on what port.

Hopefully I'll like it better than Teleport.

#twingate #teleport #networkchuck #cybersecurity

Olajide Claudius-Akinyemi

Cybersecurity Engineer || Network Security Architect || Cloud Security || IT Risk Management and Incident Responder

I don't usually promote products, but I have to say I'm really impressed with Twingate. I was skeptical at first in making use of it in my lab environment and didn't want to mess things up, but it's been a few weeks now and it has exceeded all my expectations. Twingate has really covered all the bases, from connectivity to security in my lab environment. Managing access to my resources has become a breeze, and I am rest assured knowing my remote devices have secure connectivity. Best of all, I don't have to deal with any VPN headaches anymore! If you're in the same boat as I was and looking for a software-defined perimeter solution, give Twingate a try and YES, the free version is more than sufficient for a lab use 😊. #Twingate #SDP #networksecurity #remotework

Brett Bowen

Applying Law Enforcement principles to Cyber Security investigations.

One of my favorite YouTubers (and he's here on LinkedIn as well) is Network Chuck. His videos are always entertaining, informative, and many of his videos give me a good side project to work on. Except when I waste weeks trying to get the Kubernetes cluster working on 4 Raspberry Pi's. Like for real, I don't know what I'm doing wrong, but I have exhausted the search engine results looking for a solution.

Anyway, the latest video helps you set up Twingate. If you don't know Twingate is a remote access solution. I had been using Teleport to access my homelab, but I found with my phone, it doesn't always play nice with switching networks. If I go from the work Wifi to cellular, it may or may not stay connected. I've even had situations where Teleport is stuck trying to connect and I can't seem to force it to disconnect.

Twingate was super easy to set up. I like its emphasis on security, you can authorize only specific devices and users to access it. You can also specify what resources are accessible in the first place and on what port.

Hopefully I'll like it better than Teleport.

#twingate #teleport #networkchuck #cybersecurity

Olajide Claudius-Akinyemi

Cybersecurity Engineer || Network Security Architect || Cloud Security || IT Risk Management and Incident Responder

I don't usually promote products, but I have to say I'm really impressed with Twingate. I was skeptical at first in making use of it in my lab environment and didn't want to mess things up, but it's been a few weeks now and it has exceeded all my expectations. Twingate has really covered all the bases, from connectivity to security in my lab environment. Managing access to my resources has become a breeze, and I am rest assured knowing my remote devices have secure connectivity. Best of all, I don't have to deal with any VPN headaches anymore! If you're in the same boat as I was and looking for a software-defined perimeter solution, give Twingate a try and YES, the free version is more than sufficient for a lab use 😊. #Twingate #SDP #networksecurity #remotework

⚡️Federico

@fedevitaledev

Just finished setting up @TwingateHQ with my homeassistant installation. Mindblowing how easy it has been. Literally 2 mins of setup (+30m to understand how to access HA as root)

Julian Guttzeit

@julianguttzeit

Have now installed @goteleport & @TwingateHQ on our infrastructure + customers. In combination with @linuxnetdata everything is so incredibly hustlefree! Cool!

JR

@anarkia1985

Combining #steamlink from @Steam with @TwingateHQ = secure gaming from anywhere on most devices 🤩🤩🤩

Thanks for making these awesome products.

https://dropintheocean.tech/index.php/2023…

Daniel McConnell

Senior Security Analyst at the University of Pittsburgh

Just wanted to touch on how great it has been to work with our VPN provider Twingate. Twingate allowed us to quickly roll out a VPN solution for a large number of our users spread throughout the world. Utilizing Twingate's SSO abilities, we were able to easily set up a solution that our users were able to access immediately, and we did not have to do any advanced configurations or install any hardware. We loved how easy the setup was of the VPN connectors into our private networks.

We also really loved the ease of use and management of Twingate VPN. When a user needs access, we can easily set them up and put them in a group with access to what they need. Logging in is super quick and simple. We also love the use of MFA to enhance the security of the login process. Previous solutions did not have MFA, nor were they user friendly to set up for a new user. We have loved our Twingate experience and will continue to do so. #zerotrust #twingate #security

KingNickSA

@KingNickSA

We just started looking into Twingate at our company and are liking it so far. We were looking for an alternative to pulse and as luck would have it, NetworkChuck made a video on it not too long ago. https://youtu.be/IYmXPF3XUwo

Ps- it ḍoes support AzureAD and MFA

Mike Doza

@MikeDoza517052

#twingate I cannot say how productive I am now that I am able to access my Nexus containers from my iPhone using #twingate #devsecops is so easy! Do you want to learn how to do it too?! #gitlab #devops #devopscommunity Cloud Underground had taught me so…

AlexDevUwU

@AlexDevUwU

Thanks to NetworkChuck and TwinGate, I now have a very secure and efficient way to access everything I need on my local home network.

Thanks to the video in which he talked about this, I managed to do exactly what I needed and now I can work calmly! :D

⚡️Federico

@fedevitaledev

Just finished setting up @TwingateHQ with my homeassistant installation. Mindblowing how easy it has been. Literally 2 mins of setup (+30m to understand how to access HA as root)

Julian Guttzeit

@julianguttzeit

Have now installed @goteleport & @TwingateHQ on our infrastructure + customers. In combination with @linuxnetdata everything is so incredibly hustlefree! Cool!

JR

@anarkia1985

Combining #steamlink from @Steam with @TwingateHQ = secure gaming from anywhere on most devices 🤩🤩🤩

Thanks for making these awesome products.

https://dropintheocean.tech/index.php/2023…

Daniel McConnell

Senior Security Analyst at the University of Pittsburgh

Just wanted to touch on how great it has been to work with our VPN provider Twingate. Twingate allowed us to quickly roll out a VPN solution for a large number of our users spread throughout the world. Utilizing Twingate's SSO abilities, we were able to easily set up a solution that our users were able to access immediately, and we did not have to do any advanced configurations or install any hardware. We loved how easy the setup was of the VPN connectors into our private networks.

We also really loved the ease of use and management of Twingate VPN. When a user needs access, we can easily set them up and put them in a group with access to what they need. Logging in is super quick and simple. We also love the use of MFA to enhance the security of the login process. Previous solutions did not have MFA, nor were they user friendly to set up for a new user. We have loved our Twingate experience and will continue to do so. #zerotrust #twingate #security

KingNickSA

@KingNickSA

We just started looking into Twingate at our company and are liking it so far. We were looking for an alternative to pulse and as luck would have it, NetworkChuck made a video on it not too long ago. https://youtu.be/IYmXPF3XUwo

Ps- it ḍoes support AzureAD and MFA

Mike Doza

@MikeDoza517052

#twingate I cannot say how productive I am now that I am able to access my Nexus containers from my iPhone using #twingate #devsecops is so easy! Do you want to learn how to do it too?! #gitlab #devops #devopscommunity Cloud Underground had taught me so…

AlexDevUwU

@AlexDevUwU

Thanks to NetworkChuck and TwinGate, I now have a very secure and efficient way to access everything I need on my local home network.

Thanks to the video in which he talked about this, I managed to do exactly what I needed and now I can work calmly! :D

u/permitipanyany

r/msp contributor

I like Twingate. Their team and support are the bomb. All I can say is that I was really impressed with the team over there.

DENightOne

Hi All,

Just wanted to leave a short note to tell people about a zero trust remote access service I found that for a non coder like me was extremely easy to set up and configure. Its called Twingate 9 …its almost the same as Tailscale and Zerotier…three things that I find amazing, its very easy to set up and takes a few mintues and secondly its Zero Trust by default…meaning you have to add all your resources that you want to access and you can restrict access by allowing only certain TCP or UDP ports (even disable ICMP). Lastly you can also restict the client side, meaning you can tell it to make sure the client is running Antivirus or that the Client has a lock screen on etc etc… all Policy based.

The best part is that it runs on almost everything… I would love to see someone add the docker install to Home Assistant Community Add-ons as I am not capable of writing a docker add on

Ryan Wright

@TheImmaturedad

Just setup @TwingateHQ on my home network and this ish is as smooth as butter!!

Kaoru Kohashigawa

Lead DevOps Engineer, Benti

Twingate was a breeze to set up with their Pulumi Provider!

We easily spun up Connectors in our VPC and managed team access all through code, saving us from
human error!

Corey Cross

Site Reliability Engineer, ProviderTrust

If you’re in the market for a ZTNA solution or need a better option for remote access, I can’t recommend Twingate enough. We were looking to replace our VPN and decided to go with Twingate. It didn’t have a lot of the useless complexity (that doesn’t actually add security) of other solutions, plus they’ve got out-of-the-box integrations with Okta and Jamf Pro, which were essential for the team.
We hear a lot of marketing fluff around easy implementations, but with Twingate it was dead easy. We had it up and running super quickly, plus the technical implementation of Zero Trust Networking was really solid. One exciting recent win: we were able to use Service accounts to enable our CI Workflows (GitHub Actions) to connect to private resources. That’s been pretty huge. It would’ve been a big, painful undertaking to do this without Twingate.
Twingate is just so easy to use compared to previous solutions, and it keeps getting better.

Joey Benamy

SRE, OncoLens

Implementing and managing Twingate is a devops engineer's dream. From highly relevant and technical documentation to solid IaC providers, Peter Ahn, Tony Huie, Alex M. and the team at Twingate have made it so easy to deploy and automate Twingate at any scale. OncoLens is looking forward to getting more users and resources on Twingate and trying out the upcoming features on the roadmap! #devops #sase #zerotrust

A K SINGH

@itsatulkumar

VPNs were good until Twingate arrived. Such an impressive tool.

u/nimajalali

r/sysadmin contributor

Twingate has massive flexibility when it comes to routing. You can route by IP or DNS. They even let you get down to the protocol and port level. Mostly overkill but could be useful in a bind with older networks and older systems.

Ian Calderbank

Network Architecture Consultant

Outbound tunnels only, no incoming attack surface exposed, tunnel stitching in their cloud, per device, per user and per application authorisation, integration with common major Identity providers, what's not to like.

It took me 20 minutes to get it working for a sample SME (myself). Docker to deploy the connector to an on-prem box (a NAS), all autoconfigured once the necessary authorisation keys were pasted in. Microsoft 365 for the identity, Linux packages for the endpoint.

Job done!

Mang-Git Ng

CEO at Anvil

Anvil just implemented Twingate to manage our remote access controls. Best / easiest 15min spent securing our systems.

Andrew Fong

CEO at Prodvana

Twingate solved our production access problems in less than a day.

We were able to get access to different k8s clusters in different VPCs without complex configurations. Getting that time back to focus on development was amazing.

Twingate helped us set up least privilege access controls in a much more streamlined way than any of us were used to. The sigh of relief when we realized we didn’t need to configure anything else in GCP was palpable. :)

They need to work on their marketing, but their product is phenomenal. If you are looking to ditch VPNs, check out Twingate.

u/permitipanyany

r/msp contributor

I like Twingate. Their team and support are the bomb. All I can say is that I was really impressed with the team over there.

DENightOne

Hi All,

Just wanted to leave a short note to tell people about a zero trust remote access service I found that for a non coder like me was extremely easy to set up and configure. Its called Twingate 9 …its almost the same as Tailscale and Zerotier…three things that I find amazing, its very easy to set up and takes a few mintues and secondly its Zero Trust by default…meaning you have to add all your resources that you want to access and you can restrict access by allowing only certain TCP or UDP ports (even disable ICMP). Lastly you can also restict the client side, meaning you can tell it to make sure the client is running Antivirus or that the Client has a lock screen on etc etc… all Policy based.

The best part is that it runs on almost everything… I would love to see someone add the docker install to Home Assistant Community Add-ons as I am not capable of writing a docker add on

Ryan Wright

@TheImmaturedad

Just setup @TwingateHQ on my home network and this ish is as smooth as butter!!

Kaoru Kohashigawa

Lead DevOps Engineer, Benti

Twingate was a breeze to set up with their Pulumi Provider!

We easily spun up Connectors in our VPC and managed team access all through code, saving us from
human error!

Corey Cross

Site Reliability Engineer, ProviderTrust

If you’re in the market for a ZTNA solution or need a better option for remote access, I can’t recommend Twingate enough. We were looking to replace our VPN and decided to go with Twingate. It didn’t have a lot of the useless complexity (that doesn’t actually add security) of other solutions, plus they’ve got out-of-the-box integrations with Okta and Jamf Pro, which were essential for the team.
We hear a lot of marketing fluff around easy implementations, but with Twingate it was dead easy. We had it up and running super quickly, plus the technical implementation of Zero Trust Networking was really solid. One exciting recent win: we were able to use Service accounts to enable our CI Workflows (GitHub Actions) to connect to private resources. That’s been pretty huge. It would’ve been a big, painful undertaking to do this without Twingate.
Twingate is just so easy to use compared to previous solutions, and it keeps getting better.

Joey Benamy

SRE, OncoLens

Implementing and managing Twingate is a devops engineer's dream. From highly relevant and technical documentation to solid IaC providers, Peter Ahn, Tony Huie, Alex M. and the team at Twingate have made it so easy to deploy and automate Twingate at any scale. OncoLens is looking forward to getting more users and resources on Twingate and trying out the upcoming features on the roadmap! #devops #sase #zerotrust

A K SINGH

@itsatulkumar

VPNs were good until Twingate arrived. Such an impressive tool.

u/nimajalali

r/sysadmin contributor

Twingate has massive flexibility when it comes to routing. You can route by IP or DNS. They even let you get down to the protocol and port level. Mostly overkill but could be useful in a bind with older networks and older systems.

Ian Calderbank

Network Architecture Consultant

Outbound tunnels only, no incoming attack surface exposed, tunnel stitching in their cloud, per device, per user and per application authorisation, integration with common major Identity providers, what's not to like.

It took me 20 minutes to get it working for a sample SME (myself). Docker to deploy the connector to an on-prem box (a NAS), all autoconfigured once the necessary authorisation keys were pasted in. Microsoft 365 for the identity, Linux packages for the endpoint.

Job done!

Mang-Git Ng

CEO at Anvil

Anvil just implemented Twingate to manage our remote access controls. Best / easiest 15min spent securing our systems.

Andrew Fong

CEO at Prodvana

Twingate solved our production access problems in less than a day.

We were able to get access to different k8s clusters in different VPCs without complex configurations. Getting that time back to focus on development was amazing.

Twingate helped us set up least privilege access controls in a much more streamlined way than any of us were used to. The sigh of relief when we realized we didn’t need to configure anything else in GCP was palpable. :)

They need to work on their marketing, but their product is phenomenal. If you are looking to ditch VPNs, check out Twingate.