Home / Companies / Twingate / Blog / Post Details
Content Deep Dive

Device Trust in a Zero Trust World

Blog post from Twingate

Post Details
Company
Date Published
Author
Alex Marshall
Word Count
4,559
Language
English
Hacker News Points
-
Summary

TwinGate is introducing a device trust framework to help organizations move beyond the traditional all-or-nothing approach to securing network access. The new framework provides visibility across any operating system and platform, collects device context from multiple sources, and treats device trust as a dynamic, calculated status. This allows for more nuanced policies to be created, taking into account factors such as device type, location, and network request. TwinGate's Security Policies framework will also incorporate controls that take into account device context information from EDR, MDM, and other sources. The company has recently launched its Trusted Devices feature, which enables admins to mark devices as trusted, allowing for more granular control over user access. With this launch, TwinGate aims to provide a modern zero-trust architecture that is more secure and maintainable than traditional VPNs, with significant cost savings and improved security posture for customers.