Twingate is a secure Zero Trust Network Access solution that offers integration in your security ecosystem, supports Infrastructure as Code (IaC), and is a great alternative to VPNs. In this video, I explain how Twingate works, how to set up a connector, how to add a resource, install the client, and configure security policies. We will also discuss the conceptional issues with VPN solutions and the ZeroTrust concept.
Sign Up on Twingate for free*: https://bit.ly/47WN1Gr
________________
Support me and become a Fan!
→ https://christianlempa.de/patreon
Join our Community!
→ https://christianlempa.de/discord
________________
Read my Tech Documentation
https://christianlempa.de/docs
My Gear and Equipment*
https://christianlempa.de/kit
________________
Timestamps:
00:00 Introduction
00:47 What is Twingate?
03:18 Why are VPNs not secure anymore?
07:34 ZeroTrust Network Access Concept
09:17 Twingate Architecture
12:25 Deploy Twingate Connector
17:50 Set up Resources
20:40 Security Policies and Trust
#zerotrust #twingate #homelab
________________
All links with “`*`” are and/or include affiliate links.