Movatterモバイル変換


[0]ホーム

URL:


Simpler, smarter, and more connected after Fall Update Week 2025.Here's what you missed.
DownloadLog inSchedule a demo
Get started - it's free!
Product
Solutions
Enterprise
    Customers
    Docs
      Blog
        Pricing
          Download
          Schedule a demo
          Get started - it's free!
          Log in
          WireGuard is a registered trademark of Jason A. Donenfeld.
          Terms of ServicePrivacy PolicyCalifornia NoticeCookie Notice
          © 2025 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.

          Security

          Tailscale for security teams

          Shrink the risk surface area for your organization

          Abstracted product UI showing how different employee groups can access certain resources but not others

          Trusted by security teams at companies like these

          Safeguard users, devices, and any type of workload.

          Product UI showing different authentication methods and group sync

          Secure users

          Dynamically manage the user and group lifecycle with SCIM. Authenticate network access with SSO & MFA.

          Secure devices

          Continuously verify devices meet certain conditions to retain access to your organization’s private network.

          A stylized globe showing two devices being approved before connecting to the network
          A workflow showing how Tailscale SSH protects resources on VPCs

          Secure workloads

          Explicitly authorize which users and services can communicate. Layer on additional security measures like SSH session recording.


          Strengthen your security posture

          An ACLs file being edited by one of Tailscale's on-demand access partner integrations

          Just-in-time access

          Provide just-in-time, time-bound, elevated access to employees such as on-call engineers using our API, Slackbot, or one of our partner's integrations.

          EDR integrations

          Integrate EDRs like Crowdstrike to enable device identity collection and supercharge device posture by leveraging the Zero Trust Assessment score to determine trustability.

          A status screen showing two devices connecting to the network, one is not approved due to a low Crowdstrike trust score
          A stylized product UI showing Tailscale's many SIEM partners

          Streaming audit logs

          Stream configuration audit logs, network flow logs, and SSH sessions into your preferred SIEM to surface any potentially anomalous activity.

          Zero Trust with Tailscale

          An ACLs file demonstrating how access is limited by tags and groups

          Least-privileged access with an adaptive policy engine

          Tailscale’s policy engine operates in least-privileged mode by default. Users, devices, groups, and tags must have explicitly assigned permissions for access.

          Continuous verification

          Get continuous verification with machine and user identity built into every single request. Automatically maintain access levels based on user and device state.

          A status screen showing two devices connecting connecting to each other after passing posture checks
          A stylized product UI showing unauthorized node activity

          Active assurance

          Combine system events, network flow logs, and audit logs with SSH session recording and Tailscale's check mode to drive active assurance. Quarantine devices with known IoC in seconds.

          Get these features and more with Tailscale

          Lock icon

          End to End Encryption

          Tailscale brings end-to-end WireGuard to the networking layer, ensuring each and every connection is encrypted

          App window icon

          Tailscale SSH

          Use this drop-in replacement to manage & record shell access into any linux machine without needing to share or manage keys.

          Activity icon

          Log streaming

          Stream configuration or network flow logs into a security information and event management (SIEM) system.

          Angle brackets icon

          IaC Integrations

          Easily deploy Tailscale into cloud and on-prem environments via your IaC provider of choice, including: Terraform, Pulumi, and Ansible.

          Git branch icon

          GitOps for grants and ACLs

          Easily modify and rollback JSON based network configuration directly from GitHub or GitLab.

          Checkbox icon

          Access Policy Tests

          Verify grants and access control lists (ACLs) provide sufficient coverage against unnecessary exposure.

          Laptop and phone icon

          Device posture management

          Integrate into your existing device posture management tools: CrowdStrike, SentinelOne, InTune, Jamf, Kanji and more.

          Stamp icon

          Device approval

          Review and approve new devices before they can your network.

          User check icon

          Bring your own IdP

          Tailscale works on top of your identity provider (IdP), including support for custom OpenID Connect (OIDC) providers


          Pricing that works for everyone

          Personal

          For individuals who want to securely connect personal devices, for free.

          $0per active user/month
          Get started for free
          Starter

          For small teams seeking an easy-to-use and quick-to-deploy secure network access solution.

          $6per active user/month
          Get started
          Premium

          For growing teams seeking advanced service/resource-level networking and identity-aware access controls.

          $18per active user/month
          Get started
          Enterprise

          For organizations seeking advanced user and posture management, robust compliance, and dedicated support.



          [8]ページ先頭

          ©2009-2025 Movatter.jp