How to Keep an Identity Attack from Compromising your Infrastructure
Aug 22
Virtual
Register Today
Teleport logoTry For Free
Background image

Teleport Resource Center

Webinar

Teleport 16: Advancing Infrastructure Defense-in-Depth with Device Trust, MFA, and VNet

Teleport 16: Advancing Infrastructure Defense-in-Depth with Device Trust, MFA, and VNet

Join us for an in-depth look at the latest release of Teleport. Teleport 16 introduces several powerful new features that further advance its capabilities in defending against identity provider compromise. In this webinar, we will explore how Teleport 16 enhances security and simplifies secure infrastructure access.

Watch Webinar

Tech Paper

Accelerate FedRAMP Authorization with Teleport

Accelerate FedRAMP Authorization with Teleport

Accelerate your journey to FedRAMP compliance with Teleport. Learn how our robust access control platform simplifies compliance, enhances security, and reduces time-to-market, enabling your organization to secure federal contracts.

Download Paper

Podcast

From SIEM to Detection as Code

From SIEM to Detection as Code

This episode of the Access Control Podcast explores the shift from traditional SIEMs to detection-as-code with Jack Naglieri, founder of Panther and host of the Detection at Scale podcast. The discussion delves into the benefits of detection-as-code and the importance of intentionality in threat detection and response.

Listen to Access Control Podcast

Webinar

Hardening Infrastructure Security Against SSO Identity Provider Compromise

Hardening Infrastructure Security Against SSO Identity Provider Compromise

In an era where Identity Providers (IdPs) have become prime targets for cyber attackers, relying solely on single sign-on (SSO) authentication can leave organizations vulnerable to various sophisticated threats such as social engineering, credential stuffing, and session hijacking. Join us for an in-depth webinar to explore how Teleport is redefining infrastructure security strategies that protect infrastructure even in the event of identity provider compromise.

Watch Webinar

Tech Paper

Defending against Identity Provider (IdP) Compromise

Defending against Identity Provider (IdP) Compromise

Recent incidents have underscored the escalating threats to identity ecosystems, endangering the security of businesses and individuals alike. This paper presents Infrastructure Defense in Depth, a robust security strategy utilizing Teleport to safeguard critical systems and data against compromised identity provider scenarios.

Download Paper

Webinar

Simplifying FedRAMP Compliance with Teleport

Simplifying FedRAMP Compliance with Teleport

FedRAMP compliance is notoriously challenging, but it doesn't have to derail your DevOps flow or tech stack. Discover how Teleport’s robust infrastructure access and security platform addresses some of the toughest questions and hurdles in the FedRAMP process, empowering engineering, compliance, and security leaders to implement and enforce security controls seamlessly.

Watch Webinar

Video

Three Problems that Teleport Platform Solves

Three Problems that Teleport Platform Solves

Discover how Teleport solves three critical problems for modern teams: productivity, security, and compliance.

Watch Video

Video

Boosting Productivity with Teleport

Boosting Productivity with Teleport

Discover how Teleport can supercharge your team's productivity by providing a single pane of glass for your infrastructure, streamlining setup and onboarding, and enabling on-demand access to resources.

Watch Video

Webinar

No More Backdoors: Know Who Has Access to What, Right Now

No More Backdoors: Know Who Has Access to What, Right Now

With threat actors able to breach and pivot to sensitive resources in less than 62 minutes, the security of your infrastructure depends on the ability to quickly identify who has access to what. This webinar introduces infrastructure professionals to Teleport Policy, which provides a visually rich view of access relationships and the tools to quickly uncover and remediate long-standing privileges and shadow or risky access paths.

Watch Webinar

  • 1

  • 2

  • 3

  • ...

  • 16