Use Cases
VPN Replacement
Remote access to private resources and networks
Twingate enables employees to remotely access the office network, cloud VPCs, and other private corporate resources from their computers and mobile devices.
-> Learn more
Infrastructure Access
Manage and automate access to technical infrastructure
Twingate enables engineers and DevOps to manage and automate secure access to technical infrastructure, both on-premises and in the cloud.
-> Learn more
Device Controls
Enforce device requirements for resource access
Twingate enables companies to enforce device restrictions and posture checking for access to corporate resources, with fine-grain access policies based on user, location, and device.
-> Learn more
IP-based Access
Access third-party services that require IP whitelisting
Twingate enables secure access to private resources or SaaS apps where IP-based access or whitelisting is required. Common use cases include connecting to third-party services or apps that restrict access by IP, securing staging servers, or deploying a lightweight cloud security access broker (CASB).
-> Learn more
Homelab & Personal Use Cases
Secure, remote access to your home network
Twingate enables secure, remote access to your home network and services like Home Assistant, Plex, security cameras, and other self-hosted apps. Most users are up and running in under 15 minutes, skipping the hassle of port forwarding configuration, VPN servers, or static IPs. Twingate connectors run on a variety of platforms including Raspberry Pi and NAS devices. We offer a free starter tier for personal use.
-> Learn more
Internet Security
Secure public internet traffic with DNS filtering
Twingate secures public internet traffic on employee devices by supporting blanket, device-level DNS-over-https (DOH) to a configurable DNS resolver service. Popular DNS resolvers like Google, Cloudflare, OpenDNS are all supported.
-> Learn more
Compliance
Meet security compliance requirements
Twingate helps companies to implement security controls required by compliance programs and regulatory regimes such as CPRA, GDPR, PCI DSS, and SOC 2.
-> Learn more
Last updated 8 hours ago