DNSFilter and Twingate announce Zero Trust Network Access

Today we're excited to share our blog with Twingate, a new DNSFilter partner. Twingate was founded with the goal of helping customers easily implement modern Zero Trust Network Access without compromising security or performance. With a product that can be set up in less than 15 minutes and provides a consumer-grade user and admin experience, we believe that “work from anywhere” should just work.

The author of this blog is CEO and Co-founder of Twingate, Tony Huie.

When we started Twingate in 2019, our goal was to modernize the experience of implementing secure remote access, which has traditionally relied on decades-old VPN technology as the foundation. We could never have predicted that the global pandemic of 2020 would accelerate the shift to remote work and further highlight the demand for a truly usable Zero Trust solution. Today, Twingate is announcing the next step in making Zero Trust even more accessible to more organizations, including a partnership with DNSFilter to help fully secure every organization.

Remote work brings new challenges to traditional IP-based networking

Let’s face it—VPNs were never designed for the fully distributed, work-from-anywhere world we live in today. As a result, CIOs, CISOs, and IT administrators find themselves in an uphill battle dealing with the latest security vulnerabilities, managing ever-changing IP allow/block-lists, and grappling with VPN scalability challenges, not to mention needing to provide constant support for user complaints of poor performance, connection reliability, and overall usability. Most often, we encounter customers who come to us disappointed with their existing VPN-based solution after accumulating a patchwork of technologies to support their growth, which have become brittle and difficult to manage over time.

Twingate takes a new approach to trusted access and is focused on building a new foundational primitive for the future of network security: identity. With Twingate, every network connection and packet is tied to a reliable indicator of identity (the user, machine, and/or device) and a robust platform to manage access based on that identity. At Twingate, we believe that over the next 10 years, every company will migrate from perimeter, IP-based security to Zero Trust, identity-first network security. 

Twingate and DNSFilter work together to protect your organization 

Twingate works by establishing a completely private connection between each client device and only the private resources they are permitted to access within the organization’s protected networks. All other traffic bound for the public internet (e.g. Zoom calls, Google searches) is routed directly to the destination, resulting in highly secure access to private resources without sacrificing connection speed.

In addition to the benefits of greater security and performance, Twingate can be deployed in minutes, supports every major client platform, provides application-level access controls, and integrates with every major Identity Provider. Administrators can also monitor and maintain their networks through a user-friendly but powerful consumer-grade interface. 

deploy and manage twingate


One common request we hear from customers at Twingate is that they want a way to also secure all the traffic that flows directly between the user and the public internet. Ransomware and phishing attacks have been on the rise in recent years, which have been further exacerbated by remote work, making DNSFilter the perfect complementary product to Twingate. With DNSFilter’s AI-powered content filtering solution and multi-platform roaming client, admins can now deploy DNSFilter and Twingate side by side to fully protect both private and public user traffic, no matter where they are and what device they’re on.

 

twingate and dnsfilter

 

Fast-growing and innovative companies have already adopted forward-looking technologies to enable their globally distributed remote workforces, including modern secure access technologies like DNSFilter and Twingate. For DNSFilter customers currently relying on traditional VPNs, Twingate provides a more secure option that is split tunnel by default—a setting that makes DNS resolution easier to enable. Pairing Twingate with DNSFilter’s Roaming Clients gives IT administrators more granular user access controls. IT teams can share identity-specific access using Twingate and apply filtering policies (and view reports) based on the user with DNSFilter.

Twingate customers report that they often reduce deployment time by 80% and ongoing client setup and support load by 90% compared to their previous VPN, all while expanding their distributed workforces in a more secure way.

By partnering with DNSFilter, Twingate is excited to accelerate the adoption of Zero Trust Network Access and provide true end-to-end threat protection for our customers.

For those who are new to Twingate, please get in touch. We’d be happy to show you around the product via a free product demo.

Search
  • There are no suggestions because the search field is empty.
Latest posts
Why Scaling Your MSP Doesn’t Mean Hiring More Technicians Why Scaling Your MSP Doesn’t Mean Hiring More Technicians

Growth should feel like progress. But for a lot of MSPs, there comes a point where growth starts to feel heavier instead. New clients are coming in, and revenue is rising, yet the day-to-day operation feels more stretched, not more efficient. The service desk is constantly busy. Senior techs keep getting pulled into escalations. The team is working harder just to maintain the same standard of delivery.The usual response is to hire more people. On...

The Hidden Cost of “Good Enough” Security in MSP Environments The Hidden Cost of “Good Enough” Security in MSP Environments

“Good enough” security checks the boxes and keeps the dashboards green. It covers the basics and gets you through onboarding. But in MSP environments, “good enough” usually means nothing breaks badly enough to force action. And that’s exactly the problem.The tooling system doesn’t fail. It just becomes more expensive to run, gradually turning your service desk into a permanent cleanup crew.Over time, reactive security tools create a profitability...

SASE vs SSE: What's the Difference and Why It Matters for Your Security Stack SASE vs SSE: What's the Difference and Why It Matters for Your Security Stack

If you’ve spent any time researching modern network security, you’ve likely come across SASE and SSE used interchangeably, sometimes even in vendor messaging. The result is a lot of confusion around two concepts that are closely related but not identical.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.