Twingate is a secure Zero Trust Network Access solution that offers integration in your security ecosystem, supports Infrastructure as Code (IaC), and is a great alternative to VPNs. In this video, I explain how Twingate works, how to set up a connector, how to add a resource, install the client, and configure security policies. We will also discuss the conceptional issues with VPN solutions and the Zero-Trust concept.
Sign Up on Twingate for free-*: https://bit.ly/47WN1Gr
________________
π Support me and become a Fan!
β https://christianlempa.de/patreon
π¬ Join our Community!
β https://christianlempa.de/discord
________________
Read my Tech Documentation
https://christianlempa.de/docs
My Gear and Equipment-*
https://christianlempa.de/kit
________________
Timestamps:
00:00 - Introduction
00:47 - What is Twingate?
03:18 - Why are VPNs not secure anymore?
07:34 - Zero-Trust Network Access Concept
09:17 - Twingate Architecture
12:25 - Deploy Twingate Connector
17:50 - Set up Resources
20:40 - Security Policies and Trust
#zerotrust #twingate #homelab
________________
All links with β`*`β are and/or include affiliate links.
264 Comments