Twingate at KubeCon + CloudNativeCon 2023

Twingate at KubeCon + CloudNativeCon 2023

Meet us at KubeCon Chicago

Meet us at KubeCon Chicago

Twingate makes securing K8s and accessing infra easy, performant, and scalable. We’d love to explain why. Let’s chat while you’re in town!

Twingate makes securing K8s and accessing infra easy, performant, and scalable. We’d love to explain why. Let’s chat while you’re in town!

Twingate makes securing K8s and accessing infra easy, performant, and scalable. We’d love to explain why. Let’s chat while you’re in town!

Search

FAVORITES

STG Cluster

Prod Cluster

Elastic

Gitlab

Jira

Other Resources

Sign Out

Fri 2:55 PM

Finder

Edit

View

Go

Window

Help

alex – alex@alex-mbp

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

> ssh root@k8s.prod.autoco.int

ssh: connection refused

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

Welcome to Kubernetes v1.21.1!


Type 'help' for a list of commands.


root@prod-cluster:~$

k8s.prod.autoco.int

Twingate

Twingate is trying to verify your identity for k8s.prod.autoco.int.

Touch ID or enter your password

to allow this.

Use Account Password…

Cancel

Prod Cluster

k8s.prod.autoco.int

This device is not authorized to access Prod Cluster.

Dismiss

Learn more

Search

FAVORITES

STG Cluster

Prod Cluster

Elastic

Gitlab

Jira

Other Resources

Sign Out

Finder

Edit

View

Go

Window

Help

alex – alex@alex-mbp

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

> ssh root@k8s.prod.autoco.int

ssh: connection refused

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

Welcome to Kubernetes v1.21.1!


Type 'help' for a list of commands.


root@prod-cluster:~$

k8s.prod.autoco.int

Twingate

Twingate is trying to verify your identity for k8s.prod.autoco.int.

Touch ID or enter your password

to allow this.

Use Account Password…

Cancel

Prod Cluster

k8s.prod.autoco.int

This device is not authorized to access Prod Cluster.

Dismiss

Learn more

Trusted by fast-growing companies worldwide

Trusted by fast-growing companies worldwide

Access made simple

Secure K8s clusters and technical infrastructure with Twingate

Hassle-free deployment

Deploy with Terraform or Pulumi in minutes without changing IP addresses, remapping network names, or changing firewall rules.

Seamless access

Assign granular, role-based access to K8s clusters without complicating developer workflows

Performant security

Broker direct P2P connections without exposing private resources to the internet and improving connection speeds for developers

Let’s chat about K8s & infra security

Let’s chat about
K8S & infra security

Zero Trust as Code

Zero Trust as Code

Zero Trust as Code

Automate your journey to Zero Trust

Bring security up to DevOps speed with an API-first design that easily integrates with your stack, no changes to infrastructure needed. Just choose your IaC, choose your VPC, and deploy.

"Twingate is a powerful platform that allows us to programmatically deploy and maintain a zero trust approach to our infrastructure."

Paul Guthrie

Information Security Officer, Blend

Terraform

Pulumi

Helm

terraform {
  required_providers {
    aws = {
      source  = "hashicorp/aws"
      version = "~> 4.0"
    }
    twingate = {
      source = "twingate/twingate"
    }
  }
}

variable "AWS_ACCESS_KEY_ID" {}
variable "AWS_SECRET_ACCESS_KEY" {}
variable "tg_api_key" {}
variable "tg_network" {}

# Configure the AWS Provider
provider "aws" {
  region     = "eu-west-1"
  access_key = var.AWS_ACCESS_KEY_ID
  secret_key = var.AWS_SECRET_ACCESS_KEY
}

# Configure Twingate Provider
provider "twingate" {
  api_token = var.tg_api_key
  network   = var.tg_network
}

resource "aws_key_pair" "ssh_access_key" {
  key_name   = "~/.ssh/aws_id_rsa"
  public_key = file("~/.ssh/aws_id_rsa.pub")
}

resource "twingate_remote_network" "aws_demo_network" {
  name = "aws demo remote network"
}

resource "twingate_connector" "aws_demo_connector" {
  remote_network_id = twingate_remote_network.aws_demo_network.id
}

Security at Scale

Architected for speed and reliability

+

0
1

5
6
7
8
9

7
8
9
0
1
2
3
4
5
6

%

+

0
1

5
6
7
8
9

7
8
9
0
1
2
3
4
5
6

%

Increase in bandwidth

-

4
5
6
7
8

8
9
0
1
2
3
4
5
6
7

%

Decrease in support tickets

Twingate’s unique network architecture eliminates the central chokepoints of legacy solutions that slow teams down and put your security stack at risk of outages and service disruptions.

Securing the fastest growing companies in the world

  • Neel Palrecha

    Neel Palrecha

    CTO

    “WFH made it clear that our old solution wasn't going to scale. We were surprised at how easy it was to get Twingate up, and we're excited to roll it out to the whole company.“

    Bob Bousquet

    Director of IT

    “Twingate had faster speeds than any other solution we evaluated. They make zero trust easy and our users are loving the experience.”

    Luis Zaldivar

    SRE Manager

    “We got set up in literally 30 minutes and Twingate has easily scaled to manage our most complex workflows. Even our engineers love it - and that's a high bar.”

    Emery Wells

    CEO

    “Our old VPN was giving us serious issues and causing flaky Zoom calls with everyone working remotely. It drove me and my team crazy. Twingate couldn't come soon enough.”

    Christian Trummer

    CTO

    “We evaluated several competing vendors for zero trust and Twingate was clearly the easiest to deploy. We got Twingate up in minutes.”

    Paul Guthrie

    Information Security Officer

    “We've invested heavily in automation at Blend and Twingate is a powerful platform that allows us to programmatically deploy and maintain a zero trust approach to our infrastructure.”

A security tool your developers will actually love.

Copyright © 2023 Twingate.