NetworkChuck uses Twingate for Remote Access
Erin Risk
•
Apr 28, 2023
What does IT guru NetworkChuck have to say about Twingate? One word: “magic.” Okay, a few more words (ones that we also hear from our customers): “It just works.”
In his latest video, he puts us to the test and shows his millions of YouTube subscribers how easy it is to deploy and use Twingate. Check it out for yourself here.
NetworkChuck and his team needed a tool that would allow them to securely access their company NAS and video editing machines while on the road. They needed something that met their strict security standards, but also kept pace with the speed of their work. VPNs wouldn’t cut it - not only were they too slow, they weren’t secure enough for the NetworkChuck team. With granular security policies, rapid deployment, and lightning fast peer-to-peer connections, Twingate fit the bill.
Using Twingate, the NetworkChuck team implemented zero trust controls without the hassle of setting up a full tunnel VPN. In five minutes, they had Twingate up and running with zero firewall configurations and no port forwarding required.
Watch the full 30 minute video, or skip to the sections that catch your eye:
0:00 - Network Chuck’s Twingate Use Case
2:05 - Twingate Setup & Demo
10:50 - How Twingate Works
19:45 - Setting up Device Security & MFA
21:54 - DNS-based Routing & Aliases
26:17 - Bonus Features: Wildcard Resources, Headless Clients, Terraform with CI/CD, IdP integrations, and Secure DNS
A huge thank you goes out to the NetworkChuck team for digging into Twingate and sharing with the world!
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
NetworkChuck uses Twingate for Remote Access
Erin Risk
•
Apr 28, 2023
What does IT guru NetworkChuck have to say about Twingate? One word: “magic.” Okay, a few more words (ones that we also hear from our customers): “It just works.”
In his latest video, he puts us to the test and shows his millions of YouTube subscribers how easy it is to deploy and use Twingate. Check it out for yourself here.
NetworkChuck and his team needed a tool that would allow them to securely access their company NAS and video editing machines while on the road. They needed something that met their strict security standards, but also kept pace with the speed of their work. VPNs wouldn’t cut it - not only were they too slow, they weren’t secure enough for the NetworkChuck team. With granular security policies, rapid deployment, and lightning fast peer-to-peer connections, Twingate fit the bill.
Using Twingate, the NetworkChuck team implemented zero trust controls without the hassle of setting up a full tunnel VPN. In five minutes, they had Twingate up and running with zero firewall configurations and no port forwarding required.
Watch the full 30 minute video, or skip to the sections that catch your eye:
0:00 - Network Chuck’s Twingate Use Case
2:05 - Twingate Setup & Demo
10:50 - How Twingate Works
19:45 - Setting up Device Security & MFA
21:54 - DNS-based Routing & Aliases
26:17 - Bonus Features: Wildcard Resources, Headless Clients, Terraform with CI/CD, IdP integrations, and Secure DNS
A huge thank you goes out to the NetworkChuck team for digging into Twingate and sharing with the world!
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
NetworkChuck uses Twingate for Remote Access
Erin Risk
•
Apr 28, 2023
What does IT guru NetworkChuck have to say about Twingate? One word: “magic.” Okay, a few more words (ones that we also hear from our customers): “It just works.”
In his latest video, he puts us to the test and shows his millions of YouTube subscribers how easy it is to deploy and use Twingate. Check it out for yourself here.
NetworkChuck and his team needed a tool that would allow them to securely access their company NAS and video editing machines while on the road. They needed something that met their strict security standards, but also kept pace with the speed of their work. VPNs wouldn’t cut it - not only were they too slow, they weren’t secure enough for the NetworkChuck team. With granular security policies, rapid deployment, and lightning fast peer-to-peer connections, Twingate fit the bill.
Using Twingate, the NetworkChuck team implemented zero trust controls without the hassle of setting up a full tunnel VPN. In five minutes, they had Twingate up and running with zero firewall configurations and no port forwarding required.
Watch the full 30 minute video, or skip to the sections that catch your eye:
0:00 - Network Chuck’s Twingate Use Case
2:05 - Twingate Setup & Demo
10:50 - How Twingate Works
19:45 - Setting up Device Security & MFA
21:54 - DNS-based Routing & Aliases
26:17 - Bonus Features: Wildcard Resources, Headless Clients, Terraform with CI/CD, IdP integrations, and Secure DNS
A huge thank you goes out to the NetworkChuck team for digging into Twingate and sharing with the world!
Solutions
Solutions
The VPN replacement your workforce will love.
Solutions