Teleport adds Windows support to the Infrastructure Security Gateway

0


Teleport announced today that the open source Teleport Access Layer it developed to give IT teams identity-based access to IT infrastructure is now available for both Windows Desktop and Windows Server.

The Teleport Access Plane was previously only available under Linux. Teleport has grown in importance as a security gateway available in the form of a single binary file that acts as a proxy for remote access to the IT infrastructure.

Ev Kontsevoy, CEO of Teleport, said that with additional support for Windows platforms, an IT organization will be able to standardize on a gateway and eliminate the need for internal IT teams to set individual passwords for each IT platform that they can access locally or in the cloud.

This identity-based approach also enables IT teams to ensure that no former employees can access the IT infrastructure when they leave the company. A survey of 1,000 IT and security professionals published today by Teleport found that 83% of respondents said they cannot guarantee that former employees will no longer be able to access their infrastructure.

Well over half (59%) of the IT, DevOps and security experts surveyed said that they are “concerned” or “very concerned” when former employees have secrets and / or knowledge about how their company accesses the infrastructure . More than half of respondents (53%) also indicated that their company implemented new security methods that employees did not adopt.

The survey also found that managing access is now more difficult than ever. Three in five companies run applications in virtual machines, containers, and Kubernetes, while 61% are currently using three or more databases. A full 61% of respondents said that their company had a time when a technician was unable to help solve a problem due to access issues.

Even more challenging, the survey also found that nearly half (46%) of companies must adhere to three or more compliance requirements.

Overall, 95% of respondents tend to agree or strongly agree that greater transparency is critical to the success of their business, with 86% expecting their infrastructure access technology budget to increase over the next 12 months.

A primary reason for this spending is the emphasis on zero trust IT architectures after a number of high profile cybersecurity breaches. A full 86% of respondents said that the transition to a zero trust architecture is important or very important to their company. More than three quarters said that the transition to a passwordless infrastructure is important or very important for their company.

A full 70% said they still use passwords to grant access to infrastructure, with more than half (53%) using virtual private networks (VPNs). Almost a third (32%) stated that they currently rely on short-lived identity-based certificates to grant access to the infrastructure. In all of these cases – and in the absence of a security gateway – however, it is relatively trivial for a malicious actor to increase their permissions as soon as they compromise a credential.

The barriers to achieving these security and access goals are both cultural and technical. More than half of respondents (54%) said that three or more departments are responsible for infrastructure access in their organization, with security (40%) and DevOps and engineering teams (33%) being the most frequently involved. Overall, 84% of respondents consider developer productivity to be a “big” or “most important” factor in implementing infrastructure access. In the age of great resignation, it is of crucial importance for companies to remove as much friction as possible from IT processes in order to reduce staff turnover to an absolute minimum.

Finally, 89% of respondents said that they consider the transition to just-in-time access to infrastructure to be important or very important for their company.

When companies review their software supply chains, it is only a matter of time before the way in which access to IT infrastructure is granted is scrutinized. The days when IT organizations could rely on easily compromised passwords are coming to an end. The question now is how quickly can a transition to a more secure, identity-based approach to security occur across the enterprise?


Share.

Comments are closed.