Supercharge your security. Start free.
Get the security and controls you need. No credit card required.
Starter
For organizations that need comprehensive access controls, detailed auditing, and deployment automation
For individuals and small teams that need to replace a VPN for remote access
- Up to 5 users
- Up to 1 device / person
- Up to 2 remote networks
- Up to 50 users
- Up to 2 devices / person
- Up to 5 remote networks
- Up to 150 users
- Up to 5 devices / person
- Up to 10 remote networks
- Unlimited users
- Unlimited devices
- Unlimited remote networks
- Up to 5 users
- Up to 1 device / person
- Up to 2 remote networks
- Key Features
Works on NAS, Raspberry Pi, Cloud VMs
Remote access to media servers, home automation
Native clients on Android, Linux, Mac, Windows
- See all features
Works on NAS, Raspberry Pi, Cloud VMs
Remote access to media servers, home automation
Native clients on Android, Linux, Mac, Windows
Teams
For organizations that need comprehensive access controls, detailed auditing, and deployment automation
For small teams that need to replace a VPN for remote access
- Up to 5 users
- Up to 1 device / person
- Up to 2 remote networks
- Up to 50 users
- Up to 2 devices / person
- Up to 5 remote networks
- Up to 150 users
- Up to 5 devices / person
- Up to 10 remote networks
- Unlimited users
- Unlimited devices
- Unlimited remote networks
- Up to 50 users
- Up to 2 devices / person
- Up to 5 remote networks
- Everything in Starter, plus
Network-level access policies
Email support
- See all features
Network-level access policies
Email support
Most Popular
Business
For organizations that need comprehensive access controls, detailed auditing, and deployment automation
For larger teams that need more advanced access controls
- Up to 5 users
- Up to 1 device / person
- Up to 2 remote networks
- Up to 50 users
- Up to 2 devices / person
- Up to 5 remote networks
- Up to 150 users
- Up to 5 devices / person
- Up to 10 remote networks
- Unlimited users
- Unlimited devices
- Unlimited remote networks
- Up to 150 users
- Up to 5 devices / person
- Up to 10 remote networks
- Everything in Teams, plus
Resource-level access policies
Identity provider integration
Email support
- See all features
Resource-level access policies
Identity provider integration
Email support
Enterprise
For organizations that need comprehensive access controls, detailed auditing, and deployment automation
For organizations that need comprehensive access controls, detailed auditing, and deployment automation
- Up to 5 users
- Up to 1 device / person
- Up to 2 remote networks
- Up to 50 users
- Up to 2 devices / person
- Up to 5 remote networks
- Up to 150 users
- Up to 5 devices / person
- Up to 10 remote networks
- Unlimited users
- Unlimited devices
- Unlimited remote networks
- Unlimited users
- Unlimited devices
- Unlimited remote networks
- Everything in Business, plus
Service accounts
Device posture
Network analytics
Priority support
- See all features
Service accounts
Device posture
Network analytics
Priority support
Trusted by fast-growing companies worldwide
Compare plans | Starter | Teams | Business | Enterprise |
---|---|---|---|---|
Users | Up to 5 | Up to 50 | Up to 150 | Unlimited |
Devices per user | 1 | 2 | 5 | Unlimited |
Remote Networks | 2 | 5 | 10 | Unlimited |
Wide support for network environments | Included | Included | Included | Included |
Wide support for client platforms | Included | Included | Included | Included |
Split Tunnelling | Included | Included | Included | Included |
Daily encryption key rotation | Included | Included | Included | Included |
Network-level access policies | Not included | Included | Included | Included |
Identity provider integration | Not included | Not included | Included | Included |
Admin API | Not included | Not included | Included | Included |
Device posture | Not included | Not included | Not included | Included |
Network Analytics | Not included | Not included | Not included | Included |
Support | Email & Phone | |||
Starter | Teams | Business | Enterprise |
Frequently Asked Questions
How long does it take to set up Twingate?
Twingate can be set up in 15 minutes or less. Resources on networks can be secured with our one-line Docker deployment in minutes.
If I set up Twingate, how will my employees and other end users be impacted?
Twingate can be installed alongside existing access solutions, so there’s no disruption. Employees can switch over to Twingate by simply downloading the Twingate client and turning it on themselves. No other changes are needed, and they can continue accessing the resources they need as they always have - no assistance from IT required.
Do I need to shut down my VPN to use Twingate?
No, you can run Twingate side-by-side with your VPN and decommission the VPN whenever you’re ready. No need to rip & replace.
Is my data secure with Twingate?
We take data security very seriously. Please read our article on Twingate Security to understand how we protect customer data.
How do I change my existing subscription plan?
If you already have a Twingate plan, please contact us to change your plan or your billing period.
When will I be billed?
Our plans are generally prepaid, so you pay for them in advance. Annual Enterprise plans can be invoiced with net 30 payment terms upon request.
What payment methods do you offer?
We support payment by credit card. Customers with Enterprise plans can request payment by other methods, such as wire or ACH.
What else can I do to protect myself from cybersecurity risk?
While Twingate helps to protect your network and private resources, you should also consider cyber insurance as part of implementing a well rounded information security risk management program. Twingate has partnered with cyber insurer Coalition to offer Twingate customers potential discounts on their insurance premiums. Learn more about Coalition and cyber insurance.
Where can I find your terms of service and privacy policy?
View the Twingate Customer Agreement and Privacy Policy.
How can I learn more about Twingate?
Learn more about Twingate by reading our documentation.