Рет қаралды 87,818
Twingate is a secure Zero Trust Network Access solution that offers integration in your security ecosystem, supports Infrastructure as Code (IaC), and is a great alternative to VPNs. In this video, I explain how Twingate works, how to set up a connector, how to add a resource, install the client, and configure security policies. We will also discuss the conceptional issues with VPN solutions and the Zero-Trust concept.
Sign Up on Twingate for free-*: bit.ly/47WN1Gr
________________
💜 Support me and become a Fan!
→ christianlempa.de/patreon
💬 Join our Community!
→ christianlempa.de/discord
________________
Read my Tech Documentation
christianlempa.de/docs
My Gear and Equipment-*
christianlempa.de/kit
________________
Timestamps:
00:00 - Introduction
00:47 - What is Twingate?
03:18 - Why are VPNs not secure anymore?
07:34 - Zero-Trust Network Access Concept
09:17 - Twingate Architecture
12:25 - Deploy Twingate Connector
17:50 - Set up Resources
20:40 - Security Policies and Trust
#zerotrust #twingate #homelab
________________
All links with “`*`” are and/or include affiliate links.