Love from the community
People from around the world are securing their company resources and homelabs with Twingate. Join the conversation & share what you love about Twingate!
Love from the community
People from around the world are securing their company resources and homelabs with Twingate. Join the conversation & share what you love about Twingate!
Love from the community
People from around the world are securing their company resources and homelabs with Twingate. Join the conversation & share what you love about Twingate!
Don't typically vouch for many security products, but Twingate is one that I do.
Extremely quick to spin up. Have used it on a couple of occasions to lock down privileged access. Also use it as a 'full-service' VPN to protect business travelers. Have also used it to overcome internet restrictions imposed on a manufacturing facility by an unnamed oppressive regime.
@TwingateHQ is a tool you should really look into. It has seamlessly replaced reverse tunneling ssh for me. It’s basically a super smart vpn that selectively allows me to connect to my remote server and regular connections go to regular internet.
openVPN renew is up in a week so we (our awesome Daniel) decided to try out Twingate. seems to work seamlessly. And it has a lot more capabilities that we will use going forward. (@ekampf you were the trigger for this. Thanks)
A product that completely changed the way we do things at Hippo and made our infrastructure access order of magnitude easier is @TwingateHQ. If you don't know about it, this podcast may explain. We killed 2 old enterprise VPN products. All network routes through Twingate now
Twingate is the future of VPN!!
Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.
The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.
All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.
I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.
Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.
You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.
Vishal K C
Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |
to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,
I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .
I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.
Don't typically vouch for many security products, but Twingate is one that I do.
Extremely quick to spin up. Have used it on a couple of occasions to lock down privileged access. Also use it as a 'full-service' VPN to protect business travelers. Have also used it to overcome internet restrictions imposed on a manufacturing facility by an unnamed oppressive regime.
@TwingateHQ is a tool you should really look into. It has seamlessly replaced reverse tunneling ssh for me. It’s basically a super smart vpn that selectively allows me to connect to my remote server and regular connections go to regular internet.
openVPN renew is up in a week so we (our awesome Daniel) decided to try out Twingate. seems to work seamlessly. And it has a lot more capabilities that we will use going forward. (@ekampf you were the trigger for this. Thanks)
A product that completely changed the way we do things at Hippo and made our infrastructure access order of magnitude easier is @TwingateHQ. If you don't know about it, this podcast may explain. We killed 2 old enterprise VPN products. All network routes through Twingate now
Twingate is the future of VPN!!
Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.
The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.
All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.
I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.
Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.
You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.
Vishal K C
Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |
to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,
I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .
I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.
One of my favorite YouTubers (and he's here on LinkedIn as well) is Network Chuck. His videos are always entertaining, informative, and many of his videos give me a good side project to work on. Except when I waste weeks trying to get the Kubernetes cluster working on 4 Raspberry Pi's. Like for real, I don't know what I'm doing wrong, but I have exhausted the search engine results looking for a solution.
Anyway, the latest video helps you set up Twingate. If you don't know Twingate is a remote access solution. I had been using Teleport to access my homelab, but I found with my phone, it doesn't always play nice with switching networks. If I go from the work Wifi to cellular, it may or may not stay connected. I've even had situations where Teleport is stuck trying to connect and I can't seem to force it to disconnect.
Twingate was super easy to set up. I like its emphasis on security, you can authorize only specific devices and users to access it. You can also specify what resources are accessible in the first place and on what port.
Hopefully I'll like it better than Teleport.
#twingate #teleport #networkchuck #cybersecurity
Olajide Claudius-Akinyemi
Cybersecurity Engineer || Network Security Architect || Cloud Security || IT Risk Management and Incident Responder
I don't usually promote products, but I have to say I'm really impressed with Twingate. I was skeptical at first in making use of it in my lab environment and didn't want to mess things up, but it's been a few weeks now and it has exceeded all my expectations. Twingate has really covered all the bases, from connectivity to security in my lab environment. Managing access to my resources has become a breeze, and I am rest assured knowing my remote devices have secure connectivity. Best of all, I don't have to deal with any VPN headaches anymore! If you're in the same boat as I was and looking for a software-defined perimeter solution, give Twingate a try and YES, the free version is more than sufficient for a lab use 😊. #Twingate #SDP #networksecurity #remotework
Just finished setting up @TwingateHQ with my homeassistant installation. Mindblowing how easy it has been. Literally 2 mins of setup (+30m to understand how to access HA as root)
Have now installed @goteleport & @TwingateHQ on our infrastructure + customers. In combination with @linuxnetdata everything is so incredibly hustlefree! Cool!
Combining #steamlink from @Steam with @TwingateHQ = secure gaming from anywhere on most devices 🤩🤩🤩
Thanks for making these awesome products.
Just wanted to touch on how great it has been to work with our VPN provider Twingate. Twingate allowed us to quickly roll out a VPN solution for a large number of our users spread throughout the world. Utilizing Twingate's SSO abilities, we were able to easily set up a solution that our users were able to access immediately, and we did not have to do any advanced configurations or install any hardware. We loved how easy the setup was of the VPN connectors into our private networks.
We also really loved the ease of use and management of Twingate VPN. When a user needs access, we can easily set them up and put them in a group with access to what they need. Logging in is super quick and simple. We also love the use of MFA to enhance the security of the login process. Previous solutions did not have MFA, nor were they user friendly to set up for a new user. We have loved our Twingate experience and will continue to do so. #zerotrust #twingate #security
We just started looking into Twingate at our company and are liking it so far. We were looking for an alternative to pulse and as luck would have it, NetworkChuck made a video on it not too long ago. https://youtu.be/IYmXPF3XUwo
Ps- it ḍoes support AzureAD and MFA
#twingate I cannot say how productive I am now that I am able to access my Nexus containers from my iPhone using #twingate #devsecops is so easy! Do you want to learn how to do it too?! #gitlab #devops #devopscommunity Cloud Underground had taught me so…
Hi All,
Just wanted to leave a short note to tell people about a zero trust remote access service I found that for a non coder like me was extremely easy to set up and configure. Its called Twingate 9 …its almost the same as Tailscale and Zerotier…three things that I find amazing, its very easy to set up and takes a few mintues and secondly its Zero Trust by default…meaning you have to add all your resources that you want to access and you can restrict access by allowing only certain TCP or UDP ports (even disable ICMP). Lastly you can also restict the client side, meaning you can tell it to make sure the client is running Antivirus or that the Client has a lock screen on etc etc… all Policy based.
The best part is that it runs on almost everything… I would love to see someone add the docker install to Home Assistant Community Add-ons as I am not capable of writing a docker add on
Just setup @TwingateHQ on my home network and this ish is as smooth as butter!!
If you’re in the market for a ZTNA solution or need a better option for remote access, I can’t recommend Twingate enough. We were looking to replace our VPN and decided to go with Twingate. It didn’t have a lot of the useless complexity (that doesn’t actually add security) of other solutions, plus they’ve got out-of-the-box integrations with Okta and Jamf Pro, which were essential for the team.
We hear a lot of marketing fluff around easy implementations, but with Twingate it was dead easy. We had it up and running super quickly, plus the technical implementation of Zero Trust Networking was really solid. One exciting recent win: we were able to use Service accounts to enable our CI Workflows (GitHub Actions) to connect to private resources. That’s been pretty huge. It would’ve been a big, painful undertaking to do this without Twingate.
Twingate is just so easy to use compared to previous solutions, and it keeps getting better.
Implementing and managing Twingate is a devops engineer's dream. From highly relevant and technical documentation to solid IaC providers, Peter Ahn, Tony Huie, Alex M. and the team at Twingate have made it so easy to deploy and automate Twingate at any scale. OncoLens is looking forward to getting more users and resources on Twingate and trying out the upcoming features on the roadmap! #devops #sase #zerotrust
Outbound tunnels only, no incoming attack surface exposed, tunnel stitching in their cloud, per device, per user and per application authorisation, integration with common major Identity providers, what's not to like.
It took me 20 minutes to get it working for a sample SME (myself). Docker to deploy the connector to an on-prem box (a NAS), all autoconfigured once the necessary authorisation keys were pasted in. Microsoft 365 for the identity, Linux packages for the endpoint.
Job done!
Twingate solved our production access problems in less than a day.
We were able to get access to different k8s clusters in different VPCs without complex configurations. Getting that time back to focus on development was amazing.
Twingate helped us set up least privilege access controls in a much more streamlined way than any of us were used to. The sigh of relief when we realized we didn’t need to configure anything else in GCP was palpable. :)
They need to work on their marketing, but their product is phenomenal. If you are looking to ditch VPNs, check out Twingate.
Don't typically vouch for many security products, but Twingate is one that I do.
Extremely quick to spin up. Have used it on a couple of occasions to lock down privileged access. Also use it as a 'full-service' VPN to protect business travelers. Have also used it to overcome internet restrictions imposed on a manufacturing facility by an unnamed oppressive regime.
@TwingateHQ is a tool you should really look into. It has seamlessly replaced reverse tunneling ssh for me. It’s basically a super smart vpn that selectively allows me to connect to my remote server and regular connections go to regular internet.
openVPN renew is up in a week so we (our awesome Daniel) decided to try out Twingate. seems to work seamlessly. And it has a lot more capabilities that we will use going forward. (@ekampf you were the trigger for this. Thanks)
A product that completely changed the way we do things at Hippo and made our infrastructure access order of magnitude easier is @TwingateHQ. If you don't know about it, this podcast may explain. We killed 2 old enterprise VPN products. All network routes through Twingate now
Twingate is the future of VPN!!
Push Verification and TOTP just aren’t good enough anymore. Webauthn / FIDO2 authenticators such as Yubikeys (Yubico) are the solve for phishing as they’re cryptographically verified against the issuing domain. They’re pretty close to perfect authenticators.
The problem is that many existing tools, like VPNs, control the credential verification and depend on protocols such as RADIUS to authenticate users. This means Push and TOTP are the “best” multi-factor verification methods we have – but they are clearly vulnerable to at-scale phishing and social engineering attacks. There are companies that are solving this problem – Twingate and Tailscale are two great examples. They let you embrace both better credential verification natively and IdP led flows for authenticating users.
All up, it’s scary to see the impact of the Uber hack, but I am optimistic that we’re making the right investments as an industry to help companies be more secure.
I've tried Twingate in my home lab, since I was fed up with the abysmal performance of VPN, and I must say, I was more than positively surprised by the performance. Even with a sketchy connection, I could work with Remote Desktop set at full quality.
Furthermore, you can create security policies and device checks (e.g. only allow Windows machines that with enabled firewall, hard drive encryption, and antivirus installed), 2FA for every connection attempt, etc.
You don't even have to open a port in your firewall for this, since you'll install a connector within your network that opens a secure outbound connection for which then is matched with the client outside your network.
Vishal K C
Security Researcher | Aspiring Pentester | Red Team| Newbie | SIEM | Seceon | SolarWinds | NOC | SOC | Nessus | Nexpose |
to be honest, I think it is better to switch to Zero Trust ,though it comes with the risk , we need to be taking the proper action for the prevention of exploitation,
I recently saw NetworkChuck has showed a ZT With the Collab with Twingate which provide a next level of ZT .
I think ZT is gonna be the upgrade and easy way for VPN replacement for sure.
One of my favorite YouTubers (and he's here on LinkedIn as well) is Network Chuck. His videos are always entertaining, informative, and many of his videos give me a good side project to work on. Except when I waste weeks trying to get the Kubernetes cluster working on 4 Raspberry Pi's. Like for real, I don't know what I'm doing wrong, but I have exhausted the search engine results looking for a solution.
Anyway, the latest video helps you set up Twingate. If you don't know Twingate is a remote access solution. I had been using Teleport to access my homelab, but I found with my phone, it doesn't always play nice with switching networks. If I go from the work Wifi to cellular, it may or may not stay connected. I've even had situations where Teleport is stuck trying to connect and I can't seem to force it to disconnect.
Twingate was super easy to set up. I like its emphasis on security, you can authorize only specific devices and users to access it. You can also specify what resources are accessible in the first place and on what port.
Hopefully I'll like it better than Teleport.
#twingate #teleport #networkchuck #cybersecurity
Olajide Claudius-Akinyemi
Cybersecurity Engineer || Network Security Architect || Cloud Security || IT Risk Management and Incident Responder
I don't usually promote products, but I have to say I'm really impressed with Twingate. I was skeptical at first in making use of it in my lab environment and didn't want to mess things up, but it's been a few weeks now and it has exceeded all my expectations. Twingate has really covered all the bases, from connectivity to security in my lab environment. Managing access to my resources has become a breeze, and I am rest assured knowing my remote devices have secure connectivity. Best of all, I don't have to deal with any VPN headaches anymore! If you're in the same boat as I was and looking for a software-defined perimeter solution, give Twingate a try and YES, the free version is more than sufficient for a lab use 😊. #Twingate #SDP #networksecurity #remotework
One of my favorite YouTubers (and he's here on LinkedIn as well) is Network Chuck. His videos are always entertaining, informative, and many of his videos give me a good side project to work on. Except when I waste weeks trying to get the Kubernetes cluster working on 4 Raspberry Pi's. Like for real, I don't know what I'm doing wrong, but I have exhausted the search engine results looking for a solution.
Anyway, the latest video helps you set up Twingate. If you don't know Twingate is a remote access solution. I had been using Teleport to access my homelab, but I found with my phone, it doesn't always play nice with switching networks. If I go from the work Wifi to cellular, it may or may not stay connected. I've even had situations where Teleport is stuck trying to connect and I can't seem to force it to disconnect.
Twingate was super easy to set up. I like its emphasis on security, you can authorize only specific devices and users to access it. You can also specify what resources are accessible in the first place and on what port.
Hopefully I'll like it better than Teleport.
#twingate #teleport #networkchuck #cybersecurity
Olajide Claudius-Akinyemi
Cybersecurity Engineer || Network Security Architect || Cloud Security || IT Risk Management and Incident Responder
I don't usually promote products, but I have to say I'm really impressed with Twingate. I was skeptical at first in making use of it in my lab environment and didn't want to mess things up, but it's been a few weeks now and it has exceeded all my expectations. Twingate has really covered all the bases, from connectivity to security in my lab environment. Managing access to my resources has become a breeze, and I am rest assured knowing my remote devices have secure connectivity. Best of all, I don't have to deal with any VPN headaches anymore! If you're in the same boat as I was and looking for a software-defined perimeter solution, give Twingate a try and YES, the free version is more than sufficient for a lab use 😊. #Twingate #SDP #networksecurity #remotework
Just finished setting up @TwingateHQ with my homeassistant installation. Mindblowing how easy it has been. Literally 2 mins of setup (+30m to understand how to access HA as root)
Have now installed @goteleport & @TwingateHQ on our infrastructure + customers. In combination with @linuxnetdata everything is so incredibly hustlefree! Cool!
Combining #steamlink from @Steam with @TwingateHQ = secure gaming from anywhere on most devices 🤩🤩🤩
Thanks for making these awesome products.
Just wanted to touch on how great it has been to work with our VPN provider Twingate. Twingate allowed us to quickly roll out a VPN solution for a large number of our users spread throughout the world. Utilizing Twingate's SSO abilities, we were able to easily set up a solution that our users were able to access immediately, and we did not have to do any advanced configurations or install any hardware. We loved how easy the setup was of the VPN connectors into our private networks.
We also really loved the ease of use and management of Twingate VPN. When a user needs access, we can easily set them up and put them in a group with access to what they need. Logging in is super quick and simple. We also love the use of MFA to enhance the security of the login process. Previous solutions did not have MFA, nor were they user friendly to set up for a new user. We have loved our Twingate experience and will continue to do so. #zerotrust #twingate #security
We just started looking into Twingate at our company and are liking it so far. We were looking for an alternative to pulse and as luck would have it, NetworkChuck made a video on it not too long ago. https://youtu.be/IYmXPF3XUwo
Ps- it ḍoes support AzureAD and MFA
#twingate I cannot say how productive I am now that I am able to access my Nexus containers from my iPhone using #twingate #devsecops is so easy! Do you want to learn how to do it too?! #gitlab #devops #devopscommunity Cloud Underground had taught me so…
Just finished setting up @TwingateHQ with my homeassistant installation. Mindblowing how easy it has been. Literally 2 mins of setup (+30m to understand how to access HA as root)
Have now installed @goteleport & @TwingateHQ on our infrastructure + customers. In combination with @linuxnetdata everything is so incredibly hustlefree! Cool!
Combining #steamlink from @Steam with @TwingateHQ = secure gaming from anywhere on most devices 🤩🤩🤩
Thanks for making these awesome products.
Just wanted to touch on how great it has been to work with our VPN provider Twingate. Twingate allowed us to quickly roll out a VPN solution for a large number of our users spread throughout the world. Utilizing Twingate's SSO abilities, we were able to easily set up a solution that our users were able to access immediately, and we did not have to do any advanced configurations or install any hardware. We loved how easy the setup was of the VPN connectors into our private networks.
We also really loved the ease of use and management of Twingate VPN. When a user needs access, we can easily set them up and put them in a group with access to what they need. Logging in is super quick and simple. We also love the use of MFA to enhance the security of the login process. Previous solutions did not have MFA, nor were they user friendly to set up for a new user. We have loved our Twingate experience and will continue to do so. #zerotrust #twingate #security
We just started looking into Twingate at our company and are liking it so far. We were looking for an alternative to pulse and as luck would have it, NetworkChuck made a video on it not too long ago. https://youtu.be/IYmXPF3XUwo
Ps- it ḍoes support AzureAD and MFA
#twingate I cannot say how productive I am now that I am able to access my Nexus containers from my iPhone using #twingate #devsecops is so easy! Do you want to learn how to do it too?! #gitlab #devops #devopscommunity Cloud Underground had taught me so…
Hi All,
Just wanted to leave a short note to tell people about a zero trust remote access service I found that for a non coder like me was extremely easy to set up and configure. Its called Twingate 9 …its almost the same as Tailscale and Zerotier…three things that I find amazing, its very easy to set up and takes a few mintues and secondly its Zero Trust by default…meaning you have to add all your resources that you want to access and you can restrict access by allowing only certain TCP or UDP ports (even disable ICMP). Lastly you can also restict the client side, meaning you can tell it to make sure the client is running Antivirus or that the Client has a lock screen on etc etc… all Policy based.
The best part is that it runs on almost everything… I would love to see someone add the docker install to Home Assistant Community Add-ons as I am not capable of writing a docker add on
Just setup @TwingateHQ on my home network and this ish is as smooth as butter!!
If you’re in the market for a ZTNA solution or need a better option for remote access, I can’t recommend Twingate enough. We were looking to replace our VPN and decided to go with Twingate. It didn’t have a lot of the useless complexity (that doesn’t actually add security) of other solutions, plus they’ve got out-of-the-box integrations with Okta and Jamf Pro, which were essential for the team.
We hear a lot of marketing fluff around easy implementations, but with Twingate it was dead easy. We had it up and running super quickly, plus the technical implementation of Zero Trust Networking was really solid. One exciting recent win: we were able to use Service accounts to enable our CI Workflows (GitHub Actions) to connect to private resources. That’s been pretty huge. It would’ve been a big, painful undertaking to do this without Twingate.
Twingate is just so easy to use compared to previous solutions, and it keeps getting better.
Implementing and managing Twingate is a devops engineer's dream. From highly relevant and technical documentation to solid IaC providers, Peter Ahn, Tony Huie, Alex M. and the team at Twingate have made it so easy to deploy and automate Twingate at any scale. OncoLens is looking forward to getting more users and resources on Twingate and trying out the upcoming features on the roadmap! #devops #sase #zerotrust
Outbound tunnels only, no incoming attack surface exposed, tunnel stitching in their cloud, per device, per user and per application authorisation, integration with common major Identity providers, what's not to like.
It took me 20 minutes to get it working for a sample SME (myself). Docker to deploy the connector to an on-prem box (a NAS), all autoconfigured once the necessary authorisation keys were pasted in. Microsoft 365 for the identity, Linux packages for the endpoint.
Job done!
Twingate solved our production access problems in less than a day.
We were able to get access to different k8s clusters in different VPCs without complex configurations. Getting that time back to focus on development was amazing.
Twingate helped us set up least privilege access controls in a much more streamlined way than any of us were used to. The sigh of relief when we realized we didn’t need to configure anything else in GCP was palpable. :)
They need to work on their marketing, but their product is phenomenal. If you are looking to ditch VPNs, check out Twingate.
Hi All,
Just wanted to leave a short note to tell people about a zero trust remote access service I found that for a non coder like me was extremely easy to set up and configure. Its called Twingate 9 …its almost the same as Tailscale and Zerotier…three things that I find amazing, its very easy to set up and takes a few mintues and secondly its Zero Trust by default…meaning you have to add all your resources that you want to access and you can restrict access by allowing only certain TCP or UDP ports (even disable ICMP). Lastly you can also restict the client side, meaning you can tell it to make sure the client is running Antivirus or that the Client has a lock screen on etc etc… all Policy based.
The best part is that it runs on almost everything… I would love to see someone add the docker install to Home Assistant Community Add-ons as I am not capable of writing a docker add on
Just setup @TwingateHQ on my home network and this ish is as smooth as butter!!
If you’re in the market for a ZTNA solution or need a better option for remote access, I can’t recommend Twingate enough. We were looking to replace our VPN and decided to go with Twingate. It didn’t have a lot of the useless complexity (that doesn’t actually add security) of other solutions, plus they’ve got out-of-the-box integrations with Okta and Jamf Pro, which were essential for the team.
We hear a lot of marketing fluff around easy implementations, but with Twingate it was dead easy. We had it up and running super quickly, plus the technical implementation of Zero Trust Networking was really solid. One exciting recent win: we were able to use Service accounts to enable our CI Workflows (GitHub Actions) to connect to private resources. That’s been pretty huge. It would’ve been a big, painful undertaking to do this without Twingate.
Twingate is just so easy to use compared to previous solutions, and it keeps getting better.
Implementing and managing Twingate is a devops engineer's dream. From highly relevant and technical documentation to solid IaC providers, Peter Ahn, Tony Huie, Alex M. and the team at Twingate have made it so easy to deploy and automate Twingate at any scale. OncoLens is looking forward to getting more users and resources on Twingate and trying out the upcoming features on the roadmap! #devops #sase #zerotrust
Outbound tunnels only, no incoming attack surface exposed, tunnel stitching in their cloud, per device, per user and per application authorisation, integration with common major Identity providers, what's not to like.
It took me 20 minutes to get it working for a sample SME (myself). Docker to deploy the connector to an on-prem box (a NAS), all autoconfigured once the necessary authorisation keys were pasted in. Microsoft 365 for the identity, Linux packages for the endpoint.
Job done!
Twingate solved our production access problems in less than a day.
We were able to get access to different k8s clusters in different VPCs without complex configurations. Getting that time back to focus on development was amazing.
Twingate helped us set up least privilege access controls in a much more streamlined way than any of us were used to. The sigh of relief when we realized we didn’t need to configure anything else in GCP was palpable. :)
They need to work on their marketing, but their product is phenomenal. If you are looking to ditch VPNs, check out Twingate.
The VPN replacement your workforce will love.
Solutions
The VPN replacement your workforce will love.
Solutions
The VPN replacement your workforce will love.
Solutions