Teleport, a provider of identity-native infrastructure access management solutions, has introduced Teleport 13, the most recent iteration of its Teleport Access Platform. This update is intended to improve security measures and reduce operational overhead for DevOps teams tasked with protecting cloud infrastructure.
The introduction of a ‘Teleport Team’ plan, an offering designed to provide organizations with enhanced access management capabilities while streamlining operations, is one of the major highlights of Teleport 13. This new solution is designed for Teleport Open Source users who prefer not to host the software themselves.
As cloud environments become more complex, cybercriminals would actively target user credentials and other forms of secrets as attack vectors. In addition, the strain on organizations to expedite software delivery has increased, making the trade-off between speed and security an obstacle. Teleport 13 would eliminate the need for manual vulnerability updating to resolve these issues. Notably, the most recent version introduces a singular entry point that functions as a proxy capable of communicating using a variety of network protocols. This strategy would significantly reduce the attack surface and facilitate remote access management.
Ev Kontsevoy, co-founder and CEO of Teleport, emphasized the significance of providing a managed system hosted by Teleport. Despite the fact that the Teleport Open Source edition already offers identity-native access control for people, devices, and applications, many open source users prefer not to manage the hosting aspect. Alternatively, the total enterprise cloud-hosted solution may be too costly for some organizations. This disparity would be bridged by Teleport 13’s fully managed system, which may help improve DevOps productivity while eliminating infrastructure access management’s superfluous burden.
In addition to Teleport Teams, Teleport 13 would introduce a number of other notable features including:
- Automatic Updates – The platform performs routine vulnerability testing and self-updates and patches its entire infrastructure. This would eliminate the requirement for security teams to continuously monitor vulnerabilities and implement upgrades manually. Developers can configure a maintenance window during which updates can be performed, allowing them to retain control over when agents are updated.
- TLS Routing – Teleport 13 offers users a singular network address that facilitates multiprotocol access, thereby reducing management burden and augmenting the user experience. Teleport says this feature is the first of its kind on the market for infrastructure access.
- New Integrations – The newest version of Application Access supports the importation of applications and groups from Okta. Teleport 13 additionally supports AWS OpenSearch for Database Access.
Teleport’s identity-based infrastructure access management solutions include connectivity, authentication, authorization, and auditing. The company’s approach would not only improve developer productivity but also enhance security. Teleport’s notable clients include Elastic, Samsung, NASDAQ, and IBM. Kleiner Perkins, Y Combinator, and S28 Capital are among the prominent investors who have backed the business. Teleport, with headquarters in Oakland, California, prioritizes remote employment.