NetworkChuck uses Twingate for Remote Access

Erin Risk

Apr 28, 2023

What does IT guru NetworkChuck have to say about Twingate? One word: “magic.” Okay, a few more words (ones that we also hear from our customers): “It just works.”

In his latest video, he puts us to the test and shows his millions of YouTube subscribers how easy it is to deploy and use Twingate. Check it out for yourself here.

NetworkChuck and his team needed a tool that would allow them to securely access their company NAS and video editing machines while on the road. They needed something that met their strict security standards, but also kept pace with the speed of their work. VPNs wouldn’t cut it - not only were they too slow, they weren’t secure enough for the NetworkChuck team. With granular security policies, rapid deployment, and lightning fast peer-to-peer connections, Twingate fit the bill.  

Using Twingate, the NetworkChuck team implemented zero trust controls without the hassle of setting up a full tunnel VPN. In five minutes, they had Twingate up and running with zero firewall configurations and no port forwarding required.

Watch the full 30 minute video, or skip to the sections that catch your eye:

  • 0:00 - Network Chuck’s Twingate Use Case 

  • 2:05 - Twingate Setup & Demo

  • 10:50 - How Twingate Works

  • 19:45 - Setting up Device Security & MFA

  • 21:54 - DNS-based Routing & Aliases

  • 26:17 - Bonus Features: Wildcard Resources, Headless Clients, Terraform with CI/CD, IdP integrations, and Secure DNS  

A huge thank you goes out to the NetworkChuck team for digging into Twingate and sharing with the world!

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

NetworkChuck's Use Case

NetworkChuck uses Twingate for Remote Access

Erin Risk

Apr 28, 2023

What does IT guru NetworkChuck have to say about Twingate? One word: “magic.” Okay, a few more words (ones that we also hear from our customers): “It just works.”

In his latest video, he puts us to the test and shows his millions of YouTube subscribers how easy it is to deploy and use Twingate. Check it out for yourself here.

NetworkChuck and his team needed a tool that would allow them to securely access their company NAS and video editing machines while on the road. They needed something that met their strict security standards, but also kept pace with the speed of their work. VPNs wouldn’t cut it - not only were they too slow, they weren’t secure enough for the NetworkChuck team. With granular security policies, rapid deployment, and lightning fast peer-to-peer connections, Twingate fit the bill.  

Using Twingate, the NetworkChuck team implemented zero trust controls without the hassle of setting up a full tunnel VPN. In five minutes, they had Twingate up and running with zero firewall configurations and no port forwarding required.

Watch the full 30 minute video, or skip to the sections that catch your eye:

  • 0:00 - Network Chuck’s Twingate Use Case 

  • 2:05 - Twingate Setup & Demo

  • 10:50 - How Twingate Works

  • 19:45 - Setting up Device Security & MFA

  • 21:54 - DNS-based Routing & Aliases

  • 26:17 - Bonus Features: Wildcard Resources, Headless Clients, Terraform with CI/CD, IdP integrations, and Secure DNS  

A huge thank you goes out to the NetworkChuck team for digging into Twingate and sharing with the world!

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

NetworkChuck uses Twingate for Remote Access

Erin Risk

Apr 28, 2023

What does IT guru NetworkChuck have to say about Twingate? One word: “magic.” Okay, a few more words (ones that we also hear from our customers): “It just works.”

In his latest video, he puts us to the test and shows his millions of YouTube subscribers how easy it is to deploy and use Twingate. Check it out for yourself here.

NetworkChuck and his team needed a tool that would allow them to securely access their company NAS and video editing machines while on the road. They needed something that met their strict security standards, but also kept pace with the speed of their work. VPNs wouldn’t cut it - not only were they too slow, they weren’t secure enough for the NetworkChuck team. With granular security policies, rapid deployment, and lightning fast peer-to-peer connections, Twingate fit the bill.  

Using Twingate, the NetworkChuck team implemented zero trust controls without the hassle of setting up a full tunnel VPN. In five minutes, they had Twingate up and running with zero firewall configurations and no port forwarding required.

Watch the full 30 minute video, or skip to the sections that catch your eye:

  • 0:00 - Network Chuck’s Twingate Use Case 

  • 2:05 - Twingate Setup & Demo

  • 10:50 - How Twingate Works

  • 19:45 - Setting up Device Security & MFA

  • 21:54 - DNS-based Routing & Aliases

  • 26:17 - Bonus Features: Wildcard Resources, Headless Clients, Terraform with CI/CD, IdP integrations, and Secure DNS  

A huge thank you goes out to the NetworkChuck team for digging into Twingate and sharing with the world!