Teleport adds Windows support to infrastructure security gateway-Security Boulevard

2021-12-14 14:42:42 By : Mr. Dongjie Li

Safe Blog Network Home

Home »Security Boulevard (Original)» Teleport adds Windows support to infrastructure security gateway

Teleport announced today that the open source Teleport Access Plane it created is designed to provide IT teams with identity-based access to IT infrastructure and is now available for Windows desktop and Windows Server.

Teleport Access Plane was previously only available on Linux. Teleport has gained widespread attention as a security gateway. It appears in the form of a single binary file, acting as a proxy for remote access to IT infrastructure.

Teleport CEO Ev Kontsevoy said that by adding support for the Windows platform, IT organizations will be able to standardize gateways and eliminate the need for internal IT teams to set personal passwords for every IT platform they access (whether on-premises or in the cloud). need.

This identity-based approach also allows the IT team to ensure that no former employees can access the IT infrastructure after they leave the organization. A survey of 1,000 IT and security professionals released by Teleport today found that 83% of respondents said they cannot guarantee that former employees will no longer be able to access their infrastructure.

More than half (59%) of IT, DevOps, and security professional respondents said they were “worried” or “very worried” about the secrets and/or knowledge of how their organization accesses the infrastructure when former employees leave. More than half of the respondents (53%) also stated that their organization implemented new security methods that employees failed to adopt.

The survey also pointed out that managing access permissions is now more challenging than ever. Three-fifths of organizations run applications in virtual machines, containers, and Kubernetes, and 61% currently use three or more databases. A full 61% of respondents stated that their organization has experienced periods when engineers were unable to contribute to solving problems due to interviews.

Even more challenging, the survey also found that nearly half (46%) of organizations must comply with three or more compliance requirements.

Overall, 95% of the respondents to some extent or strongly agree that greater visibility is critical to the success of their business, and 86% of the respondents expect their infrastructure access technology budget to be in the next 12 months. Increase within months.

After a series of high-profile cybersecurity vulnerabilities, a major driver of this spending is the focus on zero-trust IT architecture. A full 86% of respondents said that moving to a zero-trust architecture is important or very important to their organization. More than three-quarters said that moving to a passwordless infrastructure is equally or very important to their organizations.

A full 70% said they still use passwords to grant access to infrastructure, and more than half (53%) use virtual private networks (VPN). Less than a third (32%) said they currently rely on short-term identity-based certificates to grant infrastructure access. However, in all these cases-and in the absence of a security gateway-malicious actors can elevate their privileges once they reveal their credentials.

The obstacles to achieving these security and access goals are both technical and cultural. More than half of the respondents (54%) stated that three or more departments are responsible for infrastructure access in their organizations, with security (40%) and DevOps and engineering teams (33%) being the most frequently involved departments. In general, 84% of respondents consider developer productivity as a “big” or “primary” factor when considering implementing infrastructure access. In the era of big resignations, Kontsevoy stated that it is important for organizations to eliminate as many frictions as possible in the IT process to help keep staff turnover to a minimum.

Finally, 89% of respondents stated that they believe that timely access to infrastructure is important or very important to their organization.

When organizations review their software supply chains, it is only a matter of time before the ways in which access to IT infrastructure is granted are subject to stricter scrutiny. The days when IT organizations can rely on easy-to-crack passwords are coming to an end. The question now is how quickly the transition to a more secure identity-based security approach can take place across the enterprise.

Mike Vizard is an experienced IT reporter with more than 25 years of experience. He has also contributed to IT Business Edge, Channel Insider, Baseline and various other IT publications. Previously, Vizard was the editorial director of Ziff-Davis Enterprise and the editor-in-chief of CRN and InfoWorld.

mike-vizard has 354 posts and is still increasing. View all posts by mike-vizard