Virtual Private Networks have been the de facto standard for remote access for three decades. Yet they're fundamentally broken for modern work: slow, cumbersome, and security theater rather than actual security. Twingate represents a paradigm shift—replacing VPN complexity with zero-trust principles and delivering both superior security and user experience.
Why VPNs Are Obsolete
Traditional VPN architecture assumes the network perimeter—a concept that disappeared with cloud adoption. VPNs still operate on this assumption:
- All-or-nothing access: Connecting to a VPN grants access to the entire network. A compromised laptop on a VPN becomes a pivot point for lateral movement.
- Performance penalties: Encryption and tunneling add latency. Users experience slower applications, degrading productivity.
- Difficult compliance: Auditing VPN access is laborious; proving who accessed what requires extensive logging and analysis.
- Deployment friction: VPN clients require installation, updates, and corporate IT support for each device.
How Twingate Works
Twingate implements zero-trust by replacing the VPN gateway with a distributed architecture:
Core Components
1. Client (Twingate App)
- Lightweight daemon running on laptops, desktops, and mobile devices
- Monitors all outbound connections
- Intercepts traffic destined for private resources
- No noisy system-wide encryption; only routes private resource traffic
2. Connectors (On-Prem or Cloud)
- Lightweight gateways deployed on your network
- Receive encrypted traffic from clients
- Decrypt and forward to internal resources
- Can run on Docker, Kubernetes, Linux, macOS, Windows
3. Control Plane (SaaS)
- Cloud-hosted identity and authorization engine
- Enforces access policies based on device posture, user identity, and context
- Real-time audit logging
- No infrastructure to manage
Authentication Flow
When a client requests access to a private resource:
- Identity Verification: Twingate verifies user identity via OIDC/SAML (integrates with Okta, Azure AD, etc.)
- Device Posture Check: Confirms the device is compliant (antivirus active, disk encryption enabled, OS version)
- Policy Evaluation: Matches user + device against access policies
- Just-in-Time Access: If approved, client receives temporary encryption key and connector IP
- Encrypted Tunnel: Traffic flows through encrypted tunnel to the connector
- Decryption & Routing: Connector decrypts and forwards to internal resource
- Real-time Monitoring: All access logged with user, device, timestamp, and resource
Performance Advantages
Unlike VPNs, Twingate only encrypts traffic destined for private resources. Regular internet traffic flows directly.
Real-world Performance Metrics:
VPN (Typical):
- DNS lookup: 50-100ms (through VPN)
- HTTP request: 150-300ms (encrypted overhead)
- Throughput: 50-100 Mbps (depending on tunnel)
Twingate (Typical):
- DNS lookup: 10-20ms (local resolution)
- HTTP request to private resource: 20-50ms (only private traffic encrypted)
- Throughput to private resources: 500-1000 Mbps
Users notice Twingate. Public internet feels fast; private resources remain secure.
Security Model
Principle 1: Never Trust, Always Verify
Every access request is evaluated independently. A user may have accessed the database yesterday; that grants no implicit access today.
Example Policy:
Resource: Internal PostgreSQL (10.0.0.5:5432)
Allowed users: Database engineers
Required groups: [email protected]
Device requirements:
- Disk encryption enabled
- Antivirus active
- OS updates current
Access window: Monday-Friday, 9 AM-6 PM
IP restrictions: None (works from anywhere)
Principle 2: Minimize Trust
Clients and connectors authenticate with short-lived certificates. Compromised credentials have bounded impact.
Principle 3: Assume Breach
Assuming an attacker has access to a device:
- VPN: Attacker gets full network access
- Twingate: Attacker gets access ONLY to resources that policy permits. Fine-grained per-resource access limits blast radius.
Deployment Scenarios
Scenario 1: Cloud-First Organization
Infrastructure: AWS, Azure, GCP
Deployment: Twingate connectors on Kubernetes or EC2
Benefit: Users connect securely to cloud resources without complex networking
Architecture:
Remote Laptop → Twingate Client → Twingate Control Plane →
Kubernetes Connector → AWS RDS, ECS, EC2
Scenario 2: Hybrid Infrastructure
Infrastructure: On-prem data center + AWS
Deployment: Connectors on both on-prem and cloud
Benefit: Unified access policy across hybrid infrastructure
Scenario 3: Kubernetes-Native
Infrastructure: EKS, GKE, AKS
Deployment: Twingate as sidecar or DaemonSet
Benefit: Pod-level access control; workload identity for service-to-service connections
Comparison with Alternatives
vs. Traditional VPN:
- VPN: Broad network access; slow; complex deployment
- Twingate: Fine-grained access; fast; lightweight client
vs. Bastion Hosts:
- Bastion: Single point of failure; limited scalability; poor user experience
- Twingate: Distributed; scales horizontally; seamless for users
vs. Cloudflare Access:
- Cloudflare: Application-layer access; requires HTTP/HTTPS
- Twingate: Network-layer access; works for any protocol (SSH, RDP, database, APIs)
Costs & Licensing
Twingate pricing (as of 2026):
- Free tier: 1 connector, 2 users, limited audit logs
- Professional: $8/user/month, unlimited connectors, full audit
- Enterprise: Custom pricing, SAML/OIDC, advanced compliance
For a 100-person organization, Twingate costs $800/month vs. $2,000-5,000/month for enterprise VPN solutions.
Implementation Considerations
1. Split DNS
Configure split DNS: public internet via ISP; private resources via Twingate. Users never notice the complexity.
2. Policy Management
Start with broad policies (department-level), then refine (team-level, then individual). Overly restrictive policies frustrate users.
3. Device Posture
Define minimum device requirements:
- Disk encryption (all devices)
- Antivirus (Windows)
- Mobile device management (iOS/Android)
Balance security with user friction.
4. Audit & Compliance
Twingate logs every access request:
- User identity
- Device ID + posture
- Resource accessed
- Timestamp
- Success/failure
Export logs to SIEM (Splunk, Datadog, Sumo Logic) for compliance reporting.
Real-World Deployment Example
Organization: 200-person SaaS company Requirements: Secure access to infrastructure from remote workers
Old way (VPN):
- Deploy VPN gateway (costly)
- Distribute VPN clients to 200 users
- Support helpdesk calls for connection issues
- Broad access to entire network per user
- Difficulty auditing who accessed what
- Deploy 2-3 lightweight connectors (Docker)
- Users install Twingate client (one-time)
- No connection issues; just works
- Fine-grained per-resource access policies
- Automatic audit logging for compliance
The Future of Remote Access
Zero-trust network access is no longer optional. Regulatory requirements, increasing remote work, and cloud adoption make VPNs untenable for forward-thinking organizations.
Twingate isn't the only zero-trust solution (Teleport, HashiCorp Vault, Boundary), but it represents a clear inflection point in enterprise networking.