Forget AWS VPN, start using Zero-Trust Network Access

preview_player
Показать описание


📚 My Courses 📚

🎉SUPPORT BE A BETTER DEV🎉

📚 INCREDIBLE BOOKS TO BUILD YOUR ABILITY TO FOCUS AND ORGANIZE 📚

📚 MY RECOMMENDED READING LIST FOR SOFTWARE DEVELOPERS📚

🎙 MY RECORDING EQUIPMENT 🎙

💻 MY DESKTOP EQUIPMENT 💻

🌎 Find me here:

#SoftwareEngineer
#SoftwareDeveloper
Рекомендации по теме
Комментарии
Автор

Why use twingate and not verifiied permissions by AWS ? what are pros/cons, both are zero trust

TariqASheikh
Автор

Forgot to add “Advertisement “ on the video

rodrigoalvesvilela
Автор

It's resources. It does not contain a Z. It's pronounced with an S, not a Z.

professionalantivaxxer
Автор

thanks for the demonstration, would have been nice to mention automation through API perhaps. Also is there any configuration to be done on each resource? Is an agent required on each resource? (I assume this is based on Wireguard?)

greob