alexmensch | 5 years ago | on: Twingate – Building the foundation for identity-first network security
alexmensch's comments
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
On the pricing front, our goal is to make the service cost-competitive when you take into account the positive security externalities, but in particular the huge time sink that teams and companies put into deploying, distributing and managing a typical VPN solution. This is a big reason why we’re so focused on ease of use.
Re:BeyondCorp, I brought it up as a comparison point in my blog post, but I don’t want to appear to be making claims that our product is currently a 1:1 BeyondCorp replacement. One of the next things on our roadmap is to start exposing device inventory and posture checks as management options in the product to start getting closer to a full BeyondCorp-like offering.
However, a key insight we had in working with early beta customers is that there is significant pain to address even without getting all the way to a full zero trust / BeyondCorp state. That’s a big reason we decided to launch our product now, even before we’ve had the opportunity to add functionality we know will need to be added in the future.
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
Like most aspects of security, it’s about assessing the tradeoffs involved. From our standpoint, our interests are completely aligned with our users—earning their trust by keeping them secure benefits us, too. When you compare that to the security risks inherent to VPN (implicit total trust of devices, granting access based on joining a network, etc.) for the complexity of remote access today, what we’re hearing from our initial customers is that it’s a no-brainer.
The best analogy I can think of is Okta. Theoretically, Okta could arbitrarily authorize access to any of your internal applications, but from their customers’ standpoint that potential risk is vastly outweighed by the additional security benefits afforded by SSO.
That said, we definitely want to keep doing everything we can to improve trust in our product. One idea we’ve discussed is allowing our customers to have complete signing authority (on hardware/service entirely under their control) over all tokens in our system. As an example, would that go further to address concerns around trust from your perspective?
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
By the way, this is similar to Cloudflare Access, but we’re protocol agnostic (any TCP or UDP traffic can be proxied) and we don’t require you to change or create any public DNS entries. In fact, our best practice recommendation is that you exclusively use private DNS to cloak your private network.
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
However, I’d also question whether you even need your ephemeral bastions anymore with Twingate. A big part of the value is that you can do away with any public entry points (even if they are secured as well as you’ve described) and very tightly control who can access hosts on your deeper network. Do your bastions do more than provide access points? For example, session auditing is pretty common.
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
This is such a common use case that we wrote up a brief description of how to approach this: https://docs.twingate.com/docs/access-control-for-staging-en...
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
There's a couple other things that help, too:
1) We allow clustering as many connectors as you'd like to help you scale as usage patterns or application needs change. (This tends to be a big problem with VPN as deploying a new VPN gateway is a fairly heavy lift.)
2) Contrary to VPN deployments, which bottleneck all traffic through a single or small number of VPN gateways, our best practice recommendation is that you deploy as many connectors as you have network segments, which also helps spread out network load across multiple connectors.
Because connectors are quite different to VPN gateways, we wrote up this comparison article, too: https://docs.twingate.com/docs/understanding-access-nodes
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
1) We support native clients on every major platform (Mac, Windows, iOS, Android and Linux support just a few weeks away) which makes it super easy for anyone in a company or team to gain access without being limited to Linux.
2) Twingate natively proxies any TCP or UDP traffic and we don't care what the underlying protocol is. This is huge given that most teams are using a variety of client applications, protocols and destination servers.
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
From all of our customers conversations we've found that despite acknowledging that a better approach to remote access is possible, most people are really turned off by how hard it seems to be to implement a "zero trust" type solution. Our product goal is a 15-minute deployment, and our initial customers have been really excited about how easy it is to start using Twingate. One of the biggest selling points is that users can keep using the same addresses (either DNS or IP) for their resources with zero application, network or device configuration changes. That's a huge difference compared to every other product that's out there.
As far as the underlying technology is concerned, we're entirely standards-based with all transport encryption done via TLS. In fact, the name "Twingate" comes from an architectural decision that we made to ensure that multiple authorization checks are performed for every single network connection request.
If you'd like to dig more into the details, I'd definitely encourage you to read our "how it works" documentation here: https://docs.twingate.com/docs/how-twingate-works
alexmensch | 5 years ago | on: Show HN: Twingate – A modern solution for remote access
Twingate is a modern solution for remote access that replaces your VPN. It’s designed to address the underlying security issues with a traditional VPN + network perimeter, but it’s super simple to deploy, manage, and use. It introduces “zero trust” concepts like least-privileged access controls at the application level, hiding public attack surfaces, and continuous network authorization, but without the complicated change management typically required to get there.
We’ve particularly focused on making it work seamlessly for developer workflows & tools, so excited to hear what you all think. You can try it out for free today.
You can read more about how the underlying technology for Twingate works here: https://docs.twingate.com/docs/how-twingate-works
While most SaaS applications have already moved to SSO and Identity based controls, Twingate extends SSO and identity-based access to everything else on your private networks - private admin interfaces, servers, databases, k8s clusters, etc..
Also, with every network connection authenticated against a central user identity and authorized by security policies defined in Twingate, we also provide an identity-first view of private network flow. All private traffic is always directly associated with user identity, including the authorization rule that allowed the connection, network path information, data volume transferred, and port details. This provides an auditable record for compliance needs, investigating incidents, etc..
Twingate is free to try it out and we’d love to get your feedback!