Logo
Sign in
Product Logo
Teleport Zero Trust AccessTeleport

On-demand, least privileged access on a foundation of cryptographic identity and zero trust.

Vendor

Vendor

Teleport

Company Website

Company Website

spoc6zno.png
wmb4d7vr.png
Product details

Overview

Teleport Zero Trust Access is an infrastructure identity platform designed to streamline and secure access to distributed infrastructure. It leverages zero trust principles and cryptographic identities to eliminate credentials and reduce attack surfaces. Teleport addresses the growing complexity and security challenges posed by distributed infrastructure, cloud computing, and DevOps practices.

Features

  • Phishing-Resistant Identity: Lock down attack surfaces at every level of your infrastructure with cryptographic identities assigned to users, machines, and workloads. Teleport eliminates credentials, the #1 source of data breaches.
  • User Identity: Authenticate users without passwords leveraging Touch ID, YubiKey Bio, and other biometric devices. Add Teleport as a security layer on top of your identity provider or use Teleport's SSO.
  • Machine Identity: Securely manage machine identities to ensure that only authorized machines can access your infrastructure.
  • Resource Identity: Assign cryptographic identities to resources, ensuring secure access and communication.
  • Device Identity: Manage and secure device identities, including laptops, workstations, and YubiKeys.
  • Unified Access: Break access silos with a unified inventory of all infrastructure resources in your organization. Eliminate the need for different access paths, passwords, shared secrets, vaults, and VPNs.
  • Trusted Infrastructure: Maintain a self-updating inventory of trusted computing resources (servers, clouds, databases, Kubernetes clusters, Web apps) and enrolled TPM-equipped client devices.
  • Secure Remote Access: Enable zero-trust access to applications and workloads from anywhere, with auditable access across clouds, on-premises environments, and IoT fleets, without VPNs, bastion hosts, or vaults with shared secrets.
  • Ephemeral Privileges: Enforce the practice of least privileged access and lower the operational overhead of managing privileges or enforcing policy. Temporary access is granted through short-lived certificates bound to biometric devices and secure enclaves.
  • Consolidated Visibility & Audit: Collect all events generated by humans and machines across your entire infrastructure in one place and export to any SIEM or threat detection platforms for further analysis. Collect structured, detailed audit events for each session with identity, application, and protocol data.
  • Interactive Session Controls: Record, replay, join, and moderate interactive sessions for SSH and Kubernetes. View every active authenticated connection across your entire infrastructure and interfere if needed.
  • Compliance & Policy: Enforce access policy and workflows to comply with regulatory or corporate policy frameworks. Require approval by multiple authorized team members for highly privileged actions. Supports regulatory standards such as FedRAMP AC-3 and SOC 2.

Benefits

  • Enhanced Security: Reduces the risk of data breaches by eliminating credentials and enforcing least privileged access.
  • Improved Productivity: Streamlines access requests and onboarding/offboarding processes, enhancing engineer productivity.
  • Operational Efficiency: Simplifies infrastructure operations by unifying access control and eliminating the need for VPNs and bastion hosts.
  • Regulatory Compliance: Helps organizations meet compliance requirements with detailed audit logs and policy enforcement.
  • Scalability: Supports multi-cloud environments and scales with the growth of infrastructure resources.