Press Release
Amid rampant cyber breaches, Teleport Policy gives organizations real-time insights and centralized policy management for all infrastructure access
SAN FRANCISCO, February 6, 2024 – Infrastructure access firm Teleport has today launched a new product to help break access silos and reduce cyber risk from today’s increasingly complex DevOps infrastructure. The solution, Teleport Policy, offers organizations instant visibility and unified policy management over how engineers, users and workloads access infrastructure and data.
The rapid growth of clouds, data centers, and everything within has fragmented infrastructure into access silos. These silos service different operational needs of the organization but make it difficult for security leaders to quickly view access relationships, implement policy across infrastructure, or respond to incidents. Meanwhile, threat actors are taking aim at static and standing privileges, as well as secrets, to hijack infrastructure and data, highlighting the urgent need for more efficient ways to implement security policy.
“Our data shows that over the past year, most organizations(76%) have experienced multiple incidents of account or credentials compromise, often resulting in cybersecurity attacks or lateral movement,” said Melinda Marks, Practice Director, Cybersecurity, at Enterprise Strategy Group. “Organizations need a better approach to deliver consistency in how they manage permissions and access, including better visibility of identities and relationships to resources across environments and better ways to manage permissions, to support DevOps and security needs when operating at scale.”
Teleport Policy solves these challenges by giving customers complete information on access relationships across a company’s clouds and data centers. With actionable insights, customers can harden their security posture by removing standing or stale privileges, as well as instantly view who has access to an infrastructure resource. From there, they can intervene in a breach before a threat actor can laterally move elsewhere in the infrastructure.
“It’s an inconvenient truth that the software industry has lost the plot on who has access to what infrastructure across applications and workloads,” says Ev Kontsevoy, CEO of Teleport. “We’ve heard from infrastructure heads across the industry that, at best, it takes days on average to trace all access relationships attributed to a specific user or resource. In today’s world of rampant cyberattacks, however, that’s not agile enough to intervene in threat incidents. Our goal is to give people this much-needed visibility and control over access. Any company should be able to comprehensively apply and enforce policies like, ‘developers should not have access to production code,’ across their infrastructure.”
A report from Teleport in 2022 found that access management is becoming increasingly complicated, and there are no signs of slowing down. On average, organizations use 5.7 different tools to manage access policy, making it arduous and time-consuming to lock access for compromised users or systems.
“As identity-centered attacks increase, the ability to intervene in compromised systems is critical to prevent threat actors from laterally moving from breaches to other locations on the network that house sensitive data,” says Sasha Klizhentas, CTO of Teleport.
”Infrastructure-as-code offers tremendous flexibility, but its inherent complexity creates challenges with access control and policy management,” says Amado Gramajo, Vice President, Infrastructure & DevOps at Nasdaq, a Teleport customer. “The ability to deploy policy everywhere from one place, paired with enforced least privileged access and secure remote access from anywhere, significantly reduces management overhead and shrinks the attack surface.”
Like last year’s introduction of Teleport Identity, Teleport Policy is an extension of the company’s core Teleport Access Platform. This platform provides on-demand, least-privileged access on a foundation of cryptographic identity and zero trust. These tightly coupled products pair access control with identity and policy governance, enabling organizations to remediate compromised identities or modify policy across all infrastructure with a single click. In doing so, they also improve the engineer experience when accessing infrastructure, boosting productivity in the process.
Teleport Policy includes the following features:
For more information on Teleport Policy
Please visit https://goteleport.com/features/access-graph/.
Additionally, Teleport will present the security challenges customers face and preview Teleport Policy in a webinar hosted with Enterprise Strategy Group on February 15, 2024, at 9am Pacific. To attend, please register here.
About Teleport
Teleport is the global provider of modern access to infrastructure, improving efficiency of engineering teams, fortifying infrastructure against bad actors or error, and simplifying compliance and audit reporting. The Teleport Access Platform delivers on-demand, least privileged access to infrastructure on a foundation of cryptographic identity and zero trust, with built-in identity security and policy governance. Teleport is backed by Kleiner Perkins, Bessemer Venture Partners, and Insight Partners. Headquartered in Oakland, California, the company embraces a remote-first work culture. For more information, visit www.goteleport.com or follow @goteleport.
Jan 14, 2025
Teleport has launched Teleport 17, introducing advanced features to help large enterprises securely manage access controls and permissions across complex, multi-cloud infrastructure. Key updates include integration with AWS IAM Identity Center, multi-region high availability, and enhanced oversight of access privileges to reduce security risks and streamline compliance. With support for workload identities, cryptographic security, and integrations with tools like Okta and Terraform, Teleport 17 ensures scalable, resilient infrastructure access while eliminating credential risks. Discover how Teleport is redefining secure infrastructure access for global enterprises.
Oct 23, 2024
Advanced forms of social engineering are on the rise, though obvious gaps like weak passwords are becoming easier to plug
Oct 17, 2024
New updates to Teleport Policy enable security professionals to cut through the noise of alert fatigue, with “Crown Jewel” tagging and monitoring for access variances in critical resources