Teleport Launches Solution Empowering Organizations to Unify Access Control And Policy Across Infrastructure


Share post:

Infrastructure access firm Teleport has today launched a new product to help break access silos and reduce cyber risk from today’s increasingly complex DevOps infrastructure. The solution, Teleport Policy, offers organizations instant visibility and unified policy management over how engineers, users and workloads access infrastructure and data.

The rapid growth of clouds, data centers, and everything within has fragmented infrastructure into access silos. These silos service different operational needs of the organization but make it difficult for security leaders to quickly view access relationships, implement policy across infrastructure, or respond to incidentsMeanwhile, threat actors are taking aim at static and standing privileges, as well as secrets, to hijack infrastructure and data, highlighting the urgent need for more efficient ways to implement security policy.

“Our data shows that over the past year, most organizations (76%) have experienced multiple incidents of account or credentials compromise, often resulting in cybersecurity attacks or lateral movement,” said Melinda Marks, Practice Director, Cybersecurity, at Enterprise Strategy Group“Organizations need a better approach to deliver consistency in how they manage permissions and access, including better visibility of identities and relationships to resources across environments and better ways to manage permissions, to support DevOps and security needs when operating at scale.”

Teleport Policy solves these challenges by giving customers complete information on access relationships across a company’s clouds and data centers. With actionable insights, customers can harden their security posture by removing standing or stale privileges, as well as instantly view who has access to an infrastructure resource. From there, they can intervene in a breach before a threat actor can laterally move elsewhere in the infrastructure.

“It’s an inconvenient truth that the software industry has lost the plot on who has access to what infrastructure across applications and workloads,” says Ev Kontsevoy, CEO of Teleport. “We’ve heard from infrastructure heads across the industry that, at best, it takes days on average to trace all access relationships attributed to a specific user or resource. In today’s world of rampant cyberattacks, however, that’s not agile enough to intervene in threat incidents.  Our goal is to give people this much-needed visibility and control over access. Any company should be able to comprehensively apply and enforce policies like, ‘developers should not have access to production code,’ across their infrastructure.”

report from Teleport in 2022 found that access management is becoming increasingly complicated, and there are no signs of slowing down. On average, organizations use 5.7 different tools to manage access policy, making it arduous and time-consuming to lock access for compromised users or systems.

“As identity-centered attacks increase, the ability to intervene in compromised systems is critical to prevent threat actors from laterally moving from breaches to other locations on the network that house sensitive data,” says Sasha Klizhentas, CTO of Teleport.

”Infrastructure-as-code offers tremendous flexibility, but its inherent complexity creates challenges with access control and policy management,” says Amado Gramajo, Vice President, Infrastructure & DevOps at Nasdaq, a Teleport customer. “The ability to deploy policy everywhere from one place, paired with enforced least privileged access and secure remote access from anywhere, significantly reduces management overhead and shrinks the attack surface.”

Also Read: SQL Vs. NoSQL- Which is Better

Like last year’s introduction of Teleport Identity, Teleport Policy is an extension of the company’s core Teleport Access Platform. This platform provides on-demand, least-privileged access on a foundation of cryptographic identity and zero trust. These tightly coupled products pair access control with identity and policy governance, enabling organizations to remediate compromised identities or modify policy across all infrastructure with a single click. In doing so, they also improve the engineer experience when accessing infrastructure, boosting productivity in the process.

Teleport Policy includes the following features: 

  •  Harden security posture by identifying and replacing standing or stale privileges, over-permissive roles or roles granting too many standing privileges.
  •  Accelerate investigations and responses with visibility over access relationships in a unified Access Graph
  • Unify policy management across infrastructure silos, with the ability to query and manage  policy using SQL*, replacing esoteric languages  and file formats (*SQL management coming in fall 2024

Check Out The New Enterprisetalk Podcast. For more such updates follow us on Google News Enterprisetalk News.

TalkDev Bureau
TalkDev Bureau
The TalkDev Bureau has five well-trained writers and journalists, well versed in B2B enterprise technology industry, and constantly in touch with industry leaders for the latest trends, opinions, and other inputs- to bring you the best and latest in the domain.

Related articles

Microsoft’s DirectSR API Simplifies Implementation of DLSS, FSR, and XeSS

Microsoft has announced its upcoming DirectSR upscaling technology, which aims to simplify the implementation of major vendors' upscalers....

Nextorage Introduces 8TB SSD for PC Gamers and PS5 Owners

Nextorage has released two new 8TB SSDs - NE1N8TB and NEM-PA8TB, which are backward compatible with older interfaces...

Avenue Code Announces its Recognition as Priority Google Cloud Platform Partner

Avenue Code has been recognized as a Priority Google Cloud Platform Partner in the United States, ranking among...

Python vs. Java: A Comparison of Two Powerhouse Programming Languages

Java and Python are two of the most popular programming languages. However, developers often get caught up in...