Teleport Launches Beams — Trusted Agent Runtimes For Infrastructure
Learn More
Teleport logoGet a Demo

Press Release


Teleport Launches Identity Security Capabilities to Eliminate Hidden Infrastructure Risk

New release delivers real-time visibility into how identities move across cloud, code and infrastructure, exposing and eliminating risks traditional cybersecurity tools can’t see

OAKLAND, CA — July 15, 2025 Teleport, the Infrastructure Identity company, today announced a major update to its platform that gives security teams unprecedented insight into how identities behave as they move across identity provider, code, cloud, and infrastructure environments. With this release, Teleport Identity Security becomes the first solution to solve this with full identity chain observability: a real-time view of every step an identity takes as it traverses technology platforms, including authentication, role and privileges, developer code, and infrastructure actions. Together, these features give security teams the ability to accelerate incident response by spotting and responding to risky activity within minutes, instead of spending hours stitching together fragmented logs or building custom correlation rules.

“Identity is now the leading attack vector, but most cybersecurity products see only a part of the picture,” said Ev Kontsevoy, CEO of Teleport. “Teleport connects the dots, letting security teams detect risky behavior across fragmented systems in real time and accelerate intervention.”

Why It Matters 

Currently, identities are fragmented across different tools, such as identity providers (like Okta), cloud services (like AWS), developer platforms (like GitHub), and infrastructure resources (databases, servers, Kubernetes, workloads). These siloed identity interactions typically get tracked in siloed logs, impeding the ability to answer critical questions like:

  • Who accessed this database and through what permissions?
  • Is this behavior regular or anomalous for this identity?
  • What is the summary of all activity done in this session?
  • What accounts still have access to production after an org change?
  • Are there unmanaged keys or tokens granting backdoor access?    

With identity chain observability, security and infrastructure teams can quickly gain insights without the manual work of correlating logs, accelerate forensic investigation through evaluation of correlated data, and expose and eliminate new identity vulnerabilities that are currently hidden.

Ben Arent, Director of Product at Teleport, added, “One of our customers, within fifteen minutes of deployment, flagged two engineers whose accounts retained super-admin maintainer rights across 1,800 repos, far beyond their intended read-only access. This points to the significant impact Teleport Identity Security can have in reducing the attack surface and other vectors of compromise in complex infrastructure environments.”

Key Capabilities

Teleport Identity Security is especially relevant for security teams focused on:

  • Detecting lateral movement and insider threats
  • Accelerating forensic investigations
  • Preventing over-privileged access across cloud services
  • Meeting compliance standards like SOC 2, NIST, and ISO 42001  

Teleport Identity Security new features include:

  • Cross-platform identity tracing — Unifies log data across identity providers (e.g,, Okta), code (e.g., GitHub), cloud (e.g., AWS) and infrastructure access (e.g., Teleport) and reconstructs identity behavior across this identity chain    
  • Identity weaknesses detection and investigation — Flags anomalies and accelerates investigation, reducing the time involved in log analysis

These features build upon existing capabilities:

  • Access Graph — A real-time visual map showing the relationships between users, machines, roles, and resources, with SQL Editor    
  • Crown Jewel Monitoring — Tracks access changes to critical systems in real time   
  • SSH Key & Shadow Access Discovery — Surfaces unmanaged or legacy keys that bypass controls

Availability

Teleport’s new Identity Security capabilities are available now with Teleport 18 for on-premises instances, with cloud delivery to follow within one quarter. Teleport Identity Security is part of the Teleport Infrastructure Identity Platform, modernizing identity, access, and security for human and non-human identities in infrastructure. Learn more at goteleport.com/platform/identity-security/.
 


About Teleport

Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and compromise. The Teleport Infrastructure Identity Platform implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos. For more information, visit www.goteleport.com or follow @goteleport.