Security has a usability problem. When given a choice between security and convenience, people almost always choose the latter. As a result, security products that add too much friction, complexity, and frustration end up ineffective. This observation might sound obvious, but user-centric design is a rarity in the security space. Access control is a complex orchestration of passwords, VPNs, NACs, etc. that is suboptimal for everyone involved. Companies typically manage access through some combination of static usernames and passwords, private, protected networks tied to physical locations (aka offices), and strictly managed devices (often coupled with VPN access for remote access into those networks). However, all of today’s user behaviors illustrate the shortcomings of this model: users reuse passwords, work from everywhere, and use multiple devices for work. The tools and practices used to enforce this model create friction and frustration for users. Clunky VPNs slow down network traffic, frequent password resets drive users crazy, manual IP address allow-listing is brittle and cumbersome, and device management products are too invasive for personal devices. At Twingate, we believe there’s a better way: Zero Trust. Zero Trust has emerged as the consensus security model of the future, but IT and security leaders will tell you it is extremely challenging to put into practice. It requires too much change management, too much manual orchestration of disparate tools, too many resources, and too much patience. Our mission at Twingate is to change that dynamic by dramatically simplifying the journey towards Zero Trust. We offer a VPN replacement with a simple deployment process, powerful security controls, flexibility, high-performance connectivity, and a seamless experience for end users. With this new round of funding, we’ll be investing aggressively to scale our team and make Twingate simple enough for small businesses yet powerful enough for the largest global enterprises.