Twingate Product Rewind 2024
Lior Rozner
•
Dec 23, 2024
There’s one phrase you’ll hear over and over from the Twingate team: we ship a lot.
This year was no exception. It can be hard to keep track of all the new things Twingate has put out into the world, so let’s take a look back at some of the most exciting Twingate releases of 2024.
Our core mission remains the same: ensuring you can work securely from anywhere. For us at Twingate, that means making it easy for teams to implement the core principles of Zero Trust without sacrificing speed and productivity for your organizations.
Let’s dive in.
Automating your way to secure development
Twingate is API-first by design, meaning all of our new features are exposed via Twingate’s public APIs. This allows teams to build powerful automations for the deployment, configuration, and management of Twingate, and ensures that administrative burden doesn’t climb exponentially as teams or development environments change.
In 2024 we continued to invest in our API and Terraform provider while expanding our support for other developer tools:
Twingate now has an official Pulumi provider, with all the same functionality as our Terraform provider. Pulumi is one of the fastest-growing infrastructure automation tools on the market, and it allows you to implement IaC with a wide variety of programming languages.
Starting with v3.0.4 of our Terraform provider, we now support OpenTofu, OpenTofu is a Terraform fork that is open-source, community-driven, and managed by the Linux Foundation.
What started as a side project for VP of Engineering Eran Kampf expanded into a full Kubernetes Operator available to customers.
Enhancing best-in-class ZTNA
Zero Trust Network Access is a core foundation for the Twingate platform, and remains our top priority even as we expand into new areas.
In 2024, we had three main focuses for new ZTNA capabilities: more automation, more control, and more visibility:
We launched Usage-Based Auto-Lock, which allows you to set “use it or lose it” policies to Twingate resources. If a user doesn’t meet usage requirements, access is automatically revoked with no additional admin action needed.
On the flip side, we built native request workflows. Users who attempt to access locked Resources can now request and obtain access directly through Twingate.
We’ve expanded our access controls further by adding minimum OS version and geo-blocking as security policy requirements.
With all the granularity Twingate access policies provide, it can get complicated quickly. Twingate Access Graph is a visual graph of the relationships between users, groups, resources, policies, etc. so you can easily figure out who has access to what, troubleshoot access issues, and more.
More flexibility and visibility for Internet Security
Twingate Internet Security became generally available in 2024! As more and more customers began to implement new features like DNS and content filtering, we got great feedback about what you wanted to see next. So, we built it:
DNS filtering profiles allow you to apply different sets of rules to different Groupss in Twingate.
Users can choose to temporarily route all traffic through Twingate via Exit Networks, providing an added layer of security when users are on an unsecured network or traveling.
Explore high-level summaries of DNS logs, including top block reasons and top blocked domains, with our improved DNS dashboards.
Even more application controls
You can already use IP-based access controls to restrict access to SaaS applications, but lots of our customers want stronger and more flexible application gating and controls. That’s why we built Twingate Browser Security delivered as a browser extension, and now available in Early Access. With Browser Security you can:
Restrict access to web apps from secure managed browsers to apply an additional layer of security to your SaaS applications.
Log and block specific user actions like copy/paste, print, upload/download, and more, without breaking your applications.
Integrations
Just because we’ve released a ton of Twingate-native capabilities, we haven’t forgotten the importance of integrations. It takes lots of tools for a complete, comprehensive security stack, and we invest heavily to make sure Twingate expands the impact of your other tools:
We’ve expanded our AWS S3 integration to support syncing Twingate Network Events, DNS Filtering logs, in addition to the existing Audit Log sync. You can also now use OpenID Connect (OIDC) to authenticate Twingate with your AWS S3 bucket.
Our new integration with 1Password Device Trust launched, giving admins the option to select 1Password as a device trust verification method in Twingate.
We’ve extended our CrowdStrike integration to support Linux devices.
Twingate Labs launched a new integration with Coder so you can securely access private resources like internal databases or APIs, directly from your Coder workspace.
The importance of looking back
The team is already hard at work making a reality out of our 2025 product roadmap, but before we jump into the future I want to really take in this past year.
This blog is just a short and incomplete summary of some of the amazing things the Twingate team built. It doesn’t account for bug fixes, usability tweaks and improvements, reliability and performance investments, and all the little things that add up to make Twingate the most performant, reliable, and easy-to-use ZTNA solution on the market. Looking back, I’m struck by just how much work and dedication it takes to move at this velocity, and I’m incredibly proud of and thankful for this team.
I also want to extend my gratitude to the customers and partners who helped shape our product roadmap, who provided feedback on early versions, and who let us know when they love something new we put out into the world.
2024 was a great year for Twingate. Let’s make 2025 even better.
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
Twingate Product Rewind 2024
Lior Rozner
•
Dec 23, 2024
There’s one phrase you’ll hear over and over from the Twingate team: we ship a lot.
This year was no exception. It can be hard to keep track of all the new things Twingate has put out into the world, so let’s take a look back at some of the most exciting Twingate releases of 2024.
Our core mission remains the same: ensuring you can work securely from anywhere. For us at Twingate, that means making it easy for teams to implement the core principles of Zero Trust without sacrificing speed and productivity for your organizations.
Let’s dive in.
Automating your way to secure development
Twingate is API-first by design, meaning all of our new features are exposed via Twingate’s public APIs. This allows teams to build powerful automations for the deployment, configuration, and management of Twingate, and ensures that administrative burden doesn’t climb exponentially as teams or development environments change.
In 2024 we continued to invest in our API and Terraform provider while expanding our support for other developer tools:
Twingate now has an official Pulumi provider, with all the same functionality as our Terraform provider. Pulumi is one of the fastest-growing infrastructure automation tools on the market, and it allows you to implement IaC with a wide variety of programming languages.
Starting with v3.0.4 of our Terraform provider, we now support OpenTofu, OpenTofu is a Terraform fork that is open-source, community-driven, and managed by the Linux Foundation.
What started as a side project for VP of Engineering Eran Kampf expanded into a full Kubernetes Operator available to customers.
Enhancing best-in-class ZTNA
Zero Trust Network Access is a core foundation for the Twingate platform, and remains our top priority even as we expand into new areas.
In 2024, we had three main focuses for new ZTNA capabilities: more automation, more control, and more visibility:
We launched Usage-Based Auto-Lock, which allows you to set “use it or lose it” policies to Twingate resources. If a user doesn’t meet usage requirements, access is automatically revoked with no additional admin action needed.
On the flip side, we built native request workflows. Users who attempt to access locked Resources can now request and obtain access directly through Twingate.
We’ve expanded our access controls further by adding minimum OS version and geo-blocking as security policy requirements.
With all the granularity Twingate access policies provide, it can get complicated quickly. Twingate Access Graph is a visual graph of the relationships between users, groups, resources, policies, etc. so you can easily figure out who has access to what, troubleshoot access issues, and more.
More flexibility and visibility for Internet Security
Twingate Internet Security became generally available in 2024! As more and more customers began to implement new features like DNS and content filtering, we got great feedback about what you wanted to see next. So, we built it:
DNS filtering profiles allow you to apply different sets of rules to different Groupss in Twingate.
Users can choose to temporarily route all traffic through Twingate via Exit Networks, providing an added layer of security when users are on an unsecured network or traveling.
Explore high-level summaries of DNS logs, including top block reasons and top blocked domains, with our improved DNS dashboards.
Even more application controls
You can already use IP-based access controls to restrict access to SaaS applications, but lots of our customers want stronger and more flexible application gating and controls. That’s why we built Twingate Browser Security delivered as a browser extension, and now available in Early Access. With Browser Security you can:
Restrict access to web apps from secure managed browsers to apply an additional layer of security to your SaaS applications.
Log and block specific user actions like copy/paste, print, upload/download, and more, without breaking your applications.
Integrations
Just because we’ve released a ton of Twingate-native capabilities, we haven’t forgotten the importance of integrations. It takes lots of tools for a complete, comprehensive security stack, and we invest heavily to make sure Twingate expands the impact of your other tools:
We’ve expanded our AWS S3 integration to support syncing Twingate Network Events, DNS Filtering logs, in addition to the existing Audit Log sync. You can also now use OpenID Connect (OIDC) to authenticate Twingate with your AWS S3 bucket.
Our new integration with 1Password Device Trust launched, giving admins the option to select 1Password as a device trust verification method in Twingate.
We’ve extended our CrowdStrike integration to support Linux devices.
Twingate Labs launched a new integration with Coder so you can securely access private resources like internal databases or APIs, directly from your Coder workspace.
The importance of looking back
The team is already hard at work making a reality out of our 2025 product roadmap, but before we jump into the future I want to really take in this past year.
This blog is just a short and incomplete summary of some of the amazing things the Twingate team built. It doesn’t account for bug fixes, usability tweaks and improvements, reliability and performance investments, and all the little things that add up to make Twingate the most performant, reliable, and easy-to-use ZTNA solution on the market. Looking back, I’m struck by just how much work and dedication it takes to move at this velocity, and I’m incredibly proud of and thankful for this team.
I also want to extend my gratitude to the customers and partners who helped shape our product roadmap, who provided feedback on early versions, and who let us know when they love something new we put out into the world.
2024 was a great year for Twingate. Let’s make 2025 even better.
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
Twingate Product Rewind 2024
Lior Rozner
•
Dec 23, 2024
There’s one phrase you’ll hear over and over from the Twingate team: we ship a lot.
This year was no exception. It can be hard to keep track of all the new things Twingate has put out into the world, so let’s take a look back at some of the most exciting Twingate releases of 2024.
Our core mission remains the same: ensuring you can work securely from anywhere. For us at Twingate, that means making it easy for teams to implement the core principles of Zero Trust without sacrificing speed and productivity for your organizations.
Let’s dive in.
Automating your way to secure development
Twingate is API-first by design, meaning all of our new features are exposed via Twingate’s public APIs. This allows teams to build powerful automations for the deployment, configuration, and management of Twingate, and ensures that administrative burden doesn’t climb exponentially as teams or development environments change.
In 2024 we continued to invest in our API and Terraform provider while expanding our support for other developer tools:
Twingate now has an official Pulumi provider, with all the same functionality as our Terraform provider. Pulumi is one of the fastest-growing infrastructure automation tools on the market, and it allows you to implement IaC with a wide variety of programming languages.
Starting with v3.0.4 of our Terraform provider, we now support OpenTofu, OpenTofu is a Terraform fork that is open-source, community-driven, and managed by the Linux Foundation.
What started as a side project for VP of Engineering Eran Kampf expanded into a full Kubernetes Operator available to customers.
Enhancing best-in-class ZTNA
Zero Trust Network Access is a core foundation for the Twingate platform, and remains our top priority even as we expand into new areas.
In 2024, we had three main focuses for new ZTNA capabilities: more automation, more control, and more visibility:
We launched Usage-Based Auto-Lock, which allows you to set “use it or lose it” policies to Twingate resources. If a user doesn’t meet usage requirements, access is automatically revoked with no additional admin action needed.
On the flip side, we built native request workflows. Users who attempt to access locked Resources can now request and obtain access directly through Twingate.
We’ve expanded our access controls further by adding minimum OS version and geo-blocking as security policy requirements.
With all the granularity Twingate access policies provide, it can get complicated quickly. Twingate Access Graph is a visual graph of the relationships between users, groups, resources, policies, etc. so you can easily figure out who has access to what, troubleshoot access issues, and more.
More flexibility and visibility for Internet Security
Twingate Internet Security became generally available in 2024! As more and more customers began to implement new features like DNS and content filtering, we got great feedback about what you wanted to see next. So, we built it:
DNS filtering profiles allow you to apply different sets of rules to different Groupss in Twingate.
Users can choose to temporarily route all traffic through Twingate via Exit Networks, providing an added layer of security when users are on an unsecured network or traveling.
Explore high-level summaries of DNS logs, including top block reasons and top blocked domains, with our improved DNS dashboards.
Even more application controls
You can already use IP-based access controls to restrict access to SaaS applications, but lots of our customers want stronger and more flexible application gating and controls. That’s why we built Twingate Browser Security delivered as a browser extension, and now available in Early Access. With Browser Security you can:
Restrict access to web apps from secure managed browsers to apply an additional layer of security to your SaaS applications.
Log and block specific user actions like copy/paste, print, upload/download, and more, without breaking your applications.
Integrations
Just because we’ve released a ton of Twingate-native capabilities, we haven’t forgotten the importance of integrations. It takes lots of tools for a complete, comprehensive security stack, and we invest heavily to make sure Twingate expands the impact of your other tools:
We’ve expanded our AWS S3 integration to support syncing Twingate Network Events, DNS Filtering logs, in addition to the existing Audit Log sync. You can also now use OpenID Connect (OIDC) to authenticate Twingate with your AWS S3 bucket.
Our new integration with 1Password Device Trust launched, giving admins the option to select 1Password as a device trust verification method in Twingate.
We’ve extended our CrowdStrike integration to support Linux devices.
Twingate Labs launched a new integration with Coder so you can securely access private resources like internal databases or APIs, directly from your Coder workspace.
The importance of looking back
The team is already hard at work making a reality out of our 2025 product roadmap, but before we jump into the future I want to really take in this past year.
This blog is just a short and incomplete summary of some of the amazing things the Twingate team built. It doesn’t account for bug fixes, usability tweaks and improvements, reliability and performance investments, and all the little things that add up to make Twingate the most performant, reliable, and easy-to-use ZTNA solution on the market. Looking back, I’m struck by just how much work and dedication it takes to move at this velocity, and I’m incredibly proud of and thankful for this team.
I also want to extend my gratitude to the customers and partners who helped shape our product roadmap, who provided feedback on early versions, and who let us know when they love something new we put out into the world.
2024 was a great year for Twingate. Let’s make 2025 even better.
Solutions
Solutions
The VPN replacement your workforce will love.
Solutions