the END of VPNs?!

preview_player
Показать описание

Want to try the teams and business plan? Use my coupon codes to get 3 months FREE:
🚀Monthly Plan: NETWORKCHUCK-MONTHLY
🚀Annual Plan: NETWORKCHUCK-YEARLY

Say goodbye to VPNs for remote access! I've ditched my VPN because they're slow, complicated, and insecure - not to mention outdated! I needed a better solution - one that's lightning-fast and gives me granular control over user access. Enter Twingate, the zero-trust remote access solution that will revolutionize your remote connectivity experience. In this video, I'll guide you through setting up Twingate on your home or business network FOR FREE in just 5 minutes. Don't miss out on this game-changing technology!

SUPPORT NETWORKCHUCK
---------------------------------------------------

**Sponsored by Twingate

FOLLOW ME EVERYWHERE
---------------------------------------------------

AFFILIATES & REFERRALS
---------------------------------------------------
(GEAR I USE...STUFF I RECOMMEND)

---------------------------------------------------
Twingate is an alternative to zerotier, a global provider of software-defined networking and offers secure remote access solutions.
Twingate is an alternative to zscaler, a cloud-based security platform that provides zero-trust access solutions and internet security services.
Twingate is an alternative to Perimeter 81, a provider of cloud-based network security solutions, including zero-trust network access.
Twingate is an alternative to Pulse Secure, which provides software-defined secure access solutions and offers zero-trust access technology.
Twingate is an alternative to OpenVPN, an open-source VPN technology provider that offers secure remote access solutions for businesses.
Twingate is an alternative to Cisco, which offers zero-trust solutions that provide secure access to resources based on context and policy, leveraging multi-factor authentication and endpoint security.
---------------------------------------------------

#zerotrust #twingate #vpn
Рекомендации по теме
Комментарии
Автор

Someone needs to make an open source version so we can host the controller ourselves. I dont like twingate being in control of the controller

Ex_impius
Автор

NEVER, and I mean NEVER, rely on a third party for access into your own network. If it's not selfhosted, there is nothing secure or reliable about it.

reloadfast
Автор

I love that everyone is worried about it not being self hosted, it gives me hope

mr.alkenly
Автор

This is absolutely NOT zero trust. In this scenario you have to trust twin gate and there are multiple points of failure. First is the fact that this is closed source software, if TG get compromised or otherwise do something untrustworthy, they can push a malicious update to this software and you would never know. This requires you to trust them. Another point of failure is the fact that TG have the auth tokens. So this requires you to trust them not to leak those. Calling this Zero Trust is damaging your credibility.

JustSuds
Автор

Like everyone else, I'm concerned too because it's not open source. An important point and strength of most self-hosted VPN applications are that they're open-source, so when you say "Managed" and a third-party server comes in between, personally, no matter how legit and reliable that company is, it's a red flag for me.

farivart
Автор

"It's easy, it's the NEW way."
me: "alright"
"so you need to register for their cloud"
me: "aright imma head out"

Tommy_Tomcat
Автор

I wonder what that top secret project was...

Also your editors did a pretty big brain move saving you money by downloading more RAM!

JeffGeerling
Автор

Hey Chuck!! I have been watching this channel for a very long time and since I've started watching this channel, I started studying for certifications. I have obtained A+ and Network+ but now I am ecstatic to share that I just passed my CCNA!! You and this channel were a massive part of that! Just wanted to say thank you! I love the content and I look forward to a whole lot more to come from you I'm sure.

Charles-owfo
Автор

You like "Zero trust", and that is great, but you choose to use software that it's not configured by yourself, you do not have access to the code and you "trust them" - what about "zero trust" part?Where is it lost? :) Come on Chuck... I like your videos, and they are educative a lot, but this video is misleading and someone who is new can trust you that this is "zero trust" connection but it's not... From my point of view this is not ok and you need to emphasize that this is NOT "zero trust" connection so people won't lose trust in you...

pakonja
Автор

I know that Twingate sponsors this video, but I really value having control over my data. Therefore, I prefer Pritunl, because they have self-hosted option. Chuck, I think you should consider making a video about it. Congratulations on your video!

P.S.: The benefit of the Twingate provide is the endpoint controls.

uniufugushiku
Автор

I think the bit about the client and connector talking directly to one another is technically incorrect. While the relay knows which IPs and ports the client and connector use (after NAT), you cannot have them connect to each other. That is because the NAT routers will only accept packets originating from the relay for those ports.

So, in order to connect client and connector, the traffic has to be routed through the relay as a proxy. And while that traffic is probably encrypted, all of this is controlled by non-open software provided by Twingate. Thus, you essentially have to trust that Twingate is a. "not evil" and b. "stays secure".

Also, the ressources that are being exposed are controlled via a cloud instance ("controller") and also, who may connect to them. You essentially delegate control over what can be accessed to Twingate, putting a remote control to your network in their hands (aka "firewall piercing"). Surely, nothing to worry about, huh?

congenio
Автор

A split tunnel SSL VPN is a way better option - entirely self hosted and self configurable, and only the traffic that needs to go over the VPN does so (this negates the "everything goes through the VPN device" point that Chuck makes, only specific traffic that you define will go through it)- and their are products out there for this that also have ACLs etc. - I hate the idea of this going through a 3rd party service/server to access a private network.

cxdeblue
Автор

Yep, 0% trust on users, 100% trust on TwinGate. I've kinda heard of this concept a couple of times. It sounds interesting as tech though.

Nice video as always :)

jeronimojimenez
Автор

I know how this will go. At some point they will just remove the free tier entirely. Happened to like 5 different services I used in the past.
First they allow you to sign up for free, then remove the free tier when you rely on their service, so you either have to pay up, or quickly search for a replacement.

Shajirr_
Автор

Great review. Couple of thoughts. It's not zero trust if you're proxying with a third party. It's third-party trust at a minimum. More likely, it's third party (Twingate) plus whoever else is listening at the third-party relay; think NSA. Also, Twingate software appears to be closed-source. Again we'd have to trust that Twingate's software does only what they claim it does. That's a big camel to swallow if you're security conscious.

cignul
Автор

0:49 Thats not a VPN weakness but a lack of OPSEC on your part.
1:36 Zero trust? Doubtful. Basically you allow in a 3rd party onto your network because of the cloud control plane. BTW on the backend they use good old VPN protocols.
1:44 You can do that without VPN or this no-name sw vendor, its called "having proper firewall rules".
1:57 Gimmick, simply having an AV and fw rules doesnt mean the machine isnt infected or boned by a

jagdtigger
Автор

That looks like a great piece of software, but I am becoming increasedly concerned with amount of network infrastructure that is beginning to operate on closed source SaaS models.

arcataslacker
Автор

VPN is perfectly securable... VPN connection should be to a firewalled VLAN. Then you can specify ACL on that VLAN that controls what the users can access.

robertb
Автор

You're so good at explaining what is quite complex in a simple way. Love it!

torbjorngustafsson
Автор

What happens when Twingate's cloud/business inevitably gets hacked? What are the safeguards to ensure the hackers don't get access to everything we've provisioned access to using Twingate? I, too, would be much more excited if I could run an open source version so that I could host the controller and not be dependent of Twingate. Thanks much for the great content.

dominolastley