Go Beyond VPN

Keep private resources and internet traffic protected with Zero Trust security tools built for the modern world of work.

Search

FAVORITES

STG Cluster

Prod Cluster

Elastic

Gitlab

Jira

Other Resources

Sign Out

Fri 2:55 PM

Finder

Edit

View

Go

Window

Help

alex – alex@alex-mbp

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

> ssh root@k8s.prod.autoco.int

ssh: connection refused

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

Welcome to Kubernetes v1.21.1!


Type 'help' for a list of commands.


root@prod-cluster:~$

k8s.prod.autoco.int

Twingate

Twingate is trying to verify your identity for k8s.prod.autoco.int.

Touch ID or enter your password

to allow this.

Use Account Password…

Cancel

Prod Cluster

k8s.prod.autoco.int

This device is not authorized to access Prod Cluster.

Dismiss

Learn more

Search

FAVORITES

STG Cluster

Prod Cluster

Elastic

Gitlab

Jira

Other Resources

Sign Out

Fri 2:55 PM

Finder

Edit

View

Go

Window

Help

alex – alex@alex-mbp

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

> ssh root@k8s.prod.autoco.int

ssh: connection refused

alex@alex-mbp ~ %

ssh root@k8s.prod.autoco.int

Welcome to Kubernetes v1.21.1!


Type 'help' for a list of commands.


root@prod-cluster:~$

k8s.prod.autoco.int

Twingate

Twingate is trying to verify your identity for k8s.prod.autoco.int.

Touch ID or enter your password

to allow this.

Use Account Password…

Cancel

Prod Cluster

k8s.prod.autoco.int

This device is not authorized to access Prod Cluster.

Dismiss

Learn more

Hardware free

Eliminate challenging deployments and resource intensive maintenance with software-based ZTNA.

Zero trust security

Prevent lateral network traffic, eliminate open inbound ports, and implement the principle of least privilege across your entire network.

Performant & productive

Reduce IT support tickets and improve productivity for end users with best-in-class speed, reliability, and user experience.

Location Allowed

Device Verfied

Location Allowed

Device Verfied

Location Allowed

Device Verfied

Verify access requests before they leave the device

Verify access requests before they leave the device

Verify access requests before they leave the device

If the user isn’t authorized, the device isn’t verified, or the context is suspicious, Twingate doesn’t let the network request leave the device.

The Twingate Zero Trust Platform

Zero Trust Network Access

Remote access built for the modern workforce

Remote access built for the modern workforce

Remotely access the office network, cloud VPCs, and other private resources.

Powerful, automated access controls at the network layer.

Precisely control access based on specific device requirements.

A

Autoco

autoco.twingate.com

Recent Activity

Updated 2 minutes ago

All Activity

Alex Marshall

accessed

Airflow

Show details

2 mins ago

Sadie Kirlin

failed to connect to

Gitlab

Show details

8 mins ago

Joel Thiel

accessed

Prod Cluster

Show details

16 mins ago

Nolan Wright

accessed

Airflow

Show details

34 mins ago

Angela Bower

accessed

Prod Cluster

Show details

48 mins ago

Sadie Kirlin

failed to connect to

Prod DB

Show details

1 hour ago

To view more activity, generate a report.

A

Autoco

autoco.twingate.com

Recent Activity

Updated 2 minutes ago

All Activity

Alex Marshall

accessed

Airflow

Show details

2 mins ago

Sadie Kirlin

failed to connect to

Gitlab

Show details

8 mins ago

Joel Thiel

accessed

Prod Cluster

Show details

16 mins ago

Nolan Wright

accessed

Airflow

Show details

34 mins ago

Angela Bower

accessed

Prod Cluster

Show details

48 mins ago

Sadie Kirlin

failed to connect to

Prod DB

Show details

1 hour ago

To view more activity, generate a report.

A

Autoco

autoco.twingate.com

Recent Activity

Updated 2 minutes ago

All Activity

Alex Marshall

accessed

Airflow

Show details

2 mins ago

Sadie Kirlin

failed to connect to

Gitlab

Show details

8 mins ago

Joel Thiel

accessed

Prod Cluster

Show details

16 mins ago

Nolan Wright

accessed

Airflow

Show details

34 mins ago

Angela Bower

accessed

Prod Cluster

Show details

48 mins ago

Sadie Kirlin

failed to connect to

Prod DB

Show details

1 hour ago

To view more activity, generate a report.

Internet Security

Secure internet access from anywhere

Secure internet access from anywhere

Automatically flag, detect, and block malicious web threats.

Proactively block access to inappropriate or unwanted web-based content.

Leverage rich DNS log data to identify trends, reduce risk, and protect your end users.

Blocked Domains

Domains blocked by Security, Privacy, or manually denied.

amazon.com

202

paypal.com

41

facebook.com

22

snapchat.com

17

tiktok.com

10

4 Security Filters Enabled

An extensive set of filtering rules to block ads, trackers, and other risky domains in all countries.

Threat Intelligence Feeds

Cryptojacking Protection

Google Safe Browsing

Typosquatting Protection

Blocked Domains

Domains blocked by Security, Privacy, or manually denied.

amazon.com

202

paypal.com

41

facebook.com

22

snapchat.com

17

tiktok.com

10

4 Security Filters Enabled

An extensive set of filtering rules to block ads, trackers, and other risky domains in all countries.

Threat Intelligence Feeds

Cryptojacking Protection

Google Safe Browsing

Typosquatting Protection

Blocked Domains

Domains blocked by Security, Privacy, or manually denied.

amazon.com

202

paypal.com

41

facebook.com

22

snapchat.com

17

tiktok.com

10

4 Security Filters Enabled

An extensive set of filtering rules to block ads, trackers, and other risky domains in all countries.

Threat Intelligence Feeds

Cryptojacking Protection

Google Safe Browsing

Typosquatting Protection

Powerful security deployed in minutes

90%

90%

90%

reduction in deployment time

reduction in deployment time

99.99%

99.99%

99.99%

reliability

reliability

86%

86%

86%

faster than VPN

faster than VPN

Zero Trust as Code

Zero Trust as Code

Zero Trust as Code

Automate your journey to Zero Trust

Twingate's API-first design easily integrates with your stack, no changes to infrastructure needed. Just choose your IaC, choose your VPC, and deploy.

"Twingate is a powerful platform that allows us to programmatically deploy and maintain a zero trust approach to our infrastructure."

Paul Guthrie

Information Security Officer, Blend

Terraform

Pulumi

API

provider "twingate" {
  api_token = var.tg_api_key
  network   = var.tg_network
}

resource "twingate_remote_network" "data_network" {
  name = "data-engineering"
}

resource "twingate_groups" "devops" {
  name = "DevOps"
}

resource "twingate_resource" "resource" {
  name              = "Prod Cluster"
  address           = "prod.ops.int"
  remote_network_id = twingate_remote_network.data_network.id
  protocols = {
    allow_icmp = true
    tcp        = { policy = "RESTRICTED", ports = ["443"] }
  }
  access_group { group_id = twingate_group.devops.id }
}

Terraform

Pulumi

API

provider "twingate" {
  api_token = var.tg_api_key
  network   = var.tg_network
}

resource "twingate_remote_network" "data_network" {
  name = "data-engineering"
}

resource "twingate_groups" "devops" {
  name = "DevOps"
}

resource "twingate_resource" "resource" {
  name              = "Prod Cluster"
  address           = "prod.ops.int"
  remote_network_id = twingate_remote_network.data_network.id
  protocols = {
    allow_icmp = true
    tcp        = { policy = "RESTRICTED", ports = ["443"] }
  }
  access_group { group_id = twingate_group.devops.id }
}