Oakland, CA, USA
Mar 23, 2023   |  By Alan Parra
It’s a familiar nightmare you’ve heard of and might even face as a developer or security engineer: alerts firing in all directions warning that your company’s VPN and firewall — that supposedly “safe” defensive perimeter around your infrastructure — has been breached. And the scariest part is that you find out after the fact — after access credentials and customer assets have been stolen.
Mar 8, 2023   |  By Noah Stride
If you’re a developer, devops or security engineer whose continuous integration (CI) systems rely on shared secrets for access management, you probably know firsthand the security risks that shared secrets present.
Mar 3, 2023   |  By Kenneth DuMez
After 4 months of hard work we’re proud to announce the release of Teleport version 12! From expanded Windows and Kubernetes support, to a preview of a brand new feature we’re calling Device Trust, Teleport 12 is loaded with improvements and new capabilities that make it easier than ever to securely access your entire infrastructure ecosystem.
Mar 2, 2023   |  By Aleksandr Klizhentas, Sakshyam Shah
"Crunchy on the outside, chewy in the middle". That's how Google described its perimeter-based security targeted high-profile companies such as Google, Adobe, Akamai, Rackspace, etc., with said primary reason of modifying the source codes. In response, Google initiated a perimeter-less and trustless access control system now popularly known as BeyondCorp. BeyondCorp comes from a realization that VPN perimeter network security is obsolete.
Jan 12, 2023   |  By Ben Arent
I predict that 2023 will be the year of Passkeys. Passkeys are a new passwordless authentication method allowing users to create online accounts and sign in without entering a password. Passkeys have been years in the making and finally, industry fido alliance collaboration (fido2) and the adoption between Apple, Microsoft, and Google have now made it a reality. Passkeys leverage the WebAuthn API to let users log into various websites and applications.
Dec 30, 2022   |  By Andrew LeFevre
Copying files between computers is a common task, and there are a lot of protocols designed to do just that. But not all protocols are created equally. Many people use the popular OpenSSH scp command to transfer files, but few understand the risks surrounding it. This blog post will attempt to explain what the SCP and SFTP protocols are, how they work, and why SFTP should be used wherever possible.
Dec 13, 2022   |  By Jakub Nyckowski
If you've ever used Linux, you’ve probably heard about SELinux or Security-enhanced Linux. For a very long time, my interaction with it was just restricted to: Like many other security solutions, SELinux can sometimes be annoying, and understanding even the basic concepts can change our bigger enemy to our best friend.
Nov 30, 2022   |  By Anish Devasia
At its core, Active Directory domain services (AD DS) is a structured data store of objects in the domain controller. It is a directory service from Microsoft for identity management and access control in Windows domain networks. Active Directory can authenticate users, groups, services and computers to protected information. In addition to that, AD DS also helps to implement security policies and permissions. AD DS enforces them for all computers in your network.
Nov 18, 2022   |  By Steve Huang
In Teleport 8, we introduced the TLS Routing feature that can multiplex all client connections on a single TLS/SSL port. Recently we've added support for TLS Routing for Database Access when Teleport is deployed behind an AWS Application Load Balancer (ALB). In this article, we will take a deep look at the problem with Teleport behind an ALB and how we solved it.
Nov 9, 2022   |  By Kenneth DuMez
It’s the news everyone’s been waiting for: Teleport’s version 11 release! This release is packed with features from SFTP support all the way to GitHub Actions Machine ID compatibility. Let’s dive in!
Mar 22, 2023   |  By Teleport
Join us as we showcase the latest features of Teleport, the first identity-native infrastructure access platform for engineers and machines. Teleport delivers phishing-proof zero trust for every engineer and service connected to your global infrastructure by replacing insecure secrets with true identity.
Mar 15, 2023   |  By Teleport
In this video, we'll look at how to connect a Kubernetes cluster to Teleport. We'll also look at a new "pod-level RBAC" feature released with Teleport 12.
Mar 15, 2023   |  By Teleport
Current approaches to managing machine identity for infrastructure like Kubernetes Clusters and CI/CD workflows rely on outdated security mechanisms like passwords, shared secrets, and other manual processes that are error prone and increase the risk of breach.
Mar 3, 2023   |  By Teleport
Secure clients accessing your infrastructure with Teleport Device Trust. Device Trust integrates with endpoint management systems like Jamf and Microsoft Intune to ensure that access is only performed from an authenticated and trusted device.
Mar 3, 2023   |  By Teleport
Passwordless Windows Access for local users Get RBAC for Windows Server and Desktops without a reliance on Active Directory. Easily copy text between the clipboard on a client and a remote Windows machine and instantly share directories and files from your local client with no manual upload or download.
Mar 3, 2023   |  By Teleport

0:26 Passwordless Windows Access

1:23 CLI Support for AWS, GCP and Azure

2:07 Database Additions

3:17 Device Trust

Mar 3, 2023   |  By Teleport
Teleport version 12 is out! Here's a short rundown of a few new features.
Feb 28, 2023   |  By Teleport
Join Hunter Madison(cloud architect, @IBM ), Kenneth DuMez (developer relations engineer, @goteleport and Gus Luxton(Solutions Engineer, @goteleport ) as they discuss emerging trends in the cybersecurity space, their personal journeys in tech, and why Teleport is a must-have tool for any security-conscious business!
Feb 27, 2023   |  By Teleport
Featuring Ben Arent from @goteleport Kevin Hanford from @discord Sako from Gladly Josh Wieder from
Feb 22, 2023   |  By Teleport
Moderated by Ben Arent, DevRel Manager at Teleport. Panelists: Joseph Conti, Production Engineer at Jump Trading Group; Chris Spann, Production Engineer
Mar 5, 2020   |  By Teleport
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up.
Mar 5, 2020   |  By Teleport
While SSH has always been a popular attack vector, the increased adoption of elastic, cloud infrastructure and dynamic, micro-service architecture using containerized application services (aka, "cloud-native" applications), has resulted in the additional complexity of having application services that can migrate across dynamic server infrastructure. This makes managing access to applications and their infrastructure through SSH more complicated and more prone to security threats.
Mar 1, 2020   |  By Teleport
In this paper, we will provide a brief description of what SSM Session Manager is and how it compares to Gravitational's Teleport privileged access management solution. We'll compare the significant design and feature differences and the operational overhead of the solutions. Because Session Manager is limited to AWS, we'll limit the scope of the discussion to that cloud provider. Finally, we have provided a feature matrix of the two solutions.
Feb 1, 2020   |  By Teleport
HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any company that deals with protected health information (PHI) must ensure that all the required physical, network, and process security measures are in place and followed.
Feb 1, 2020   |  By Teleport
The goal of the paper is to identify key challenges and the most promising opportunities for small to medium sized server hosting providers in an era of rapid commoditization driven by AWS.

Security and Compliance for Cloud Applications and Infrastructure. Cloud-native application delivery with robust Day-2 operations across many clouds, in restricted, regulated and remote environments.

Get compliance and security best practices out-of-the-box and make it easy for engineers to access SSH and Kubernetes environments across many clouds, data centers and edge devices. Deploy and Run Kubernetes applications on your customers' clouds, on the edge, and even in air-gapped server rooms, without overloading your DevOps teams.

Our products are open-source and based on open standards:

  • Teleport: Access Kubernetes and Linux infrastructure across clouds, datacenters and IoT devices while enforcing industry best-practices for security and compliance.
  • Gravity: Deploy and run cloud-native applications in hundreds of locations where security and compliance matter, on your customers' clouds or on the edge.
  • Teleconsole: Teleconsole is a free service to share your terminal session with people you trust. Your friends can join via a command line via SSH or via their browser over HTTPS. Use this to ask for help or to connect to your own devices sitting behind NAT.

Grow your business across many production environments without having to worry about the vendor lock-in.