Introducing Twingate thumbnail

Alex Marshall • 

At this time we’re proud to announce the launch of Twingate, a contemporary distant entry answer designed to markedly enhance your safety posture with out introducing compromise and complications round deployment and ease of use. In case you are a developer, work in DevOps, or are a community administrator, Twingate has been designed along with your wants in thoughts.

We first determined to construct Twingate after we have been doing buyer analysis nearly 18 months in the past. It was abundantly clear that distant entry was damaged. VPN—a expertise that’s nearly 30 years outdated—has remained a de facto customary for distant entry regardless of serving person wants poorly, introducing extra complexity into infrastructure choices, and being the weak point behind multi-million greenback safety breaches. Given these severe flaws, and our personal destructive experiences utilizing VPN as staff, we have been baffled as to why a brand new product had not emerged to interchange it. We moved on from Home windows 95 way back, so why hasn’t distant entry caught up?

Underestimating the specter of an outdated mannequin

After talking to almost fifty IT, safety, and networking professionals at corporations of extensively various sizes throughout a number of industries, a couple of traits grew to become obvious, repeated in nearly each dialog. Probably the most shocking of those is that most individuals we spoke to are conscious {that a} safer strategy to distant entry exists, however they suppose that it’s far too complicated and dear to implement. Summarizing our buyer conversations, these are the primary traits that drove the strategy we took with Twingate:

  • The standard “fort and moat” strategy to community safety persists, regardless of monumental adjustments to how we work over the previous 20 years.
  • The safety dangers inherent to lateral motion and assault “blast radius” are considerably underestimated and broadly unmitigated
  • Most individuals are conscious that a way more safe strategy exists, with Google’s BeyondCorp proprietary implementation cited often
  • Nonetheless, the stage of complexity concerned in implementing an equal answer is perceived to be insurmountable

Reflecting on the above traits, the diagram under possible illustrates a community structure very near what you recurrently entry, administer, or each. Entry includes some brittle mixture of static IP whitelisting, subnet mapping for distant customers, a susceptible gateway on the general public web, firewall rule administration, and routing rule administration. That stage of administration overhead doesn’t even begin to account for a way susceptible this normal community structure is to lateral motion and the ensuing potential for severe enterprise losses and influence.

Conventional perimeter-based community structure with VPN

The explanation that this structure persists is grounded in a gradual creep outwards from an outdated perimeter-based strategy to securing networks. Nonetheless, with the dislocation of person units, customers, and purposes alike, a completely new strategy is clearly wanted to safe entry.

Restoring the steadiness between safety and ease of use

“Twingate is the proper product for the way forward for distant work. Enterprise VPNs are a problem – they get overloaded and trigger issues for customers working from house.”

– Matthew Corridor, CTO at SpringboardVR

When designing Twingate, we knew that we would wish to take a “no compromises” strategy to safety, however the problem was making certain that the product would nonetheless be each straightforward to make use of and—critically—straightforward to undertake for finish customers and directors alike. We’re exceptionally pleased with what we’ve constructed, and just like the buyer quoted above, we predict you’ll discover it surprisingly straightforward to each nearly remove your community’s assault floor and enhance customers’ expertise on the identical time.

Twingate’s design and growth are pushed by the next core ideas:

  • Undeniably safer. Twingate makes use of standards-based cryptographic strategies to encrypt and authorize community site visitors, however we take a singular strategy to the extent of decentralized settlement that should exist to authorize community connections. (In reality, the title Twingate is derived from the a number of cryptographic checks that each community connection should move.)
  • Easy to deploy. Again and again, we’ve seen enterprise merchandise fail as a result of they don’t take note of the significance of minimizing the ache surrounding change administration. Whether or not it’s integrating with an current id supplier, deploying infrastructure with a one-line Docker command, or enabling self-service deployment for finish customers, we’ve centered on making Twingate straightforward to make use of.
  • Designed for a way we really work in the present day. Customers entry purposes hosted in a number of environments from a number of units, in a number of places, and from a number of networks. These situations usually are not future traits authored by an trade analyst; that is the fact of working in 2020. Add to that the tremendously expanded vary and class of cybersecurity threats, and it’s clear that the outdated perimeter-based mannequin is now not ample.

Simplified community structure with Twingate

Twingate’s deployment mannequin is extremely easy:

  • Deploy a connector behind the firewall on any community that it’s worthwhile to present distant entry to.
  • Outline any variety of vacation spot sources. Solely these particular locations can be accessible, and nothing extra, leading to a least-privileged entry mannequin by default.
  • Have customers self-install the Twingate shopper app and authenticate utilizing their current credentials.

That’s it. Customers proceed to entry sources utilizing their current addresses, utilizing any software as they did earlier than. No adjustments to the underlying purposes or sources are required to permit Twingate to authorize entry. Networks may also be utterly segregated, minimizing the complexity of any routing or firewall guidelines. The correct strategy to community safety may be carried out independently of any entry wants.

Give your self the community safety you deserve (with out the ache)

Although we by no means might have predicted the adjustments the world has seen since these first buyer interviews, the safety issues inherent to distant entry at the moment are extra urgent than ever earlier than, with distant work changing into an in a single day necessity. The entire staff has put an enormous quantity of effort into creating Twingate over the previous 18 months, and we’re assured that what we’ve constructed represents a step perform departure from in the present day’s typical expertise and outdated expertise.

We invite you to expertise Twingate for your self and skim extra about the expertise behind our product.

By Admin

Leave a Reply

Your email address will not be published. Required fields are marked *