Teleport

6K posts

Teleport banner
Teleport

Teleport

@goteleport

Unified Identity Securing Classic & AI Infrastructure.

Oakland, CA Katılım Ağustos 2015
2.1K Takip Edilen3.8K Takipçiler
Sabitlenmiş Tweet
Teleport
Teleport@goteleport·
The Identity Summit is coming to London. May 13 @ Shangri-La The Shard. Focused sessions on agentic identity: securing the AI agents, GPUs, and data pipelines reshaping enterprise infrastructure. Invitation-only. 50 seats. One afternoon. → goteleport.com/identity-summi…
Teleport tweet media
English
0
0
1
1.1K
Teleport
Teleport@goteleport·
Everyone is asking how to secure their AI infrastructure. Ev Kontsevoy says that's the wrong first question.
English
0
0
0
74
Teleport
Teleport@goteleport·
Live from The Shard for Teleport Identity Summit London — incredible energy in the room today 🔐
Teleport tweet mediaTeleport tweet mediaTeleport tweet mediaTeleport tweet media
English
0
1
1
110
Teleport
Teleport@goteleport·
"Where was Teleport all these years." Mayur Pipaliya, years in security, on what it feels like to finally find it.
English
0
0
0
133
Teleport
Teleport@goteleport·
Pick a random database. Pick a random table. Who has delete access? Ev says most orgs can't answer that in under a week, and AI makes that problem impossible.
English
0
0
0
129
Teleport
Teleport@goteleport·
"My engineers are going to love this. My security folks aren't going to believe this." Gus Luxton on why that reaction still gets him out of bed in the morning.
English
0
0
0
134
Teleport
Teleport@goteleport·
"We major in business and minor in sales." Teleport's Senior Sales Director John Solazzo on what great enterprise sales leadership actually looks like — and why saying no is sometimes the most powerful thing a salesperson can do. goteleport.com/blog/meet-the-…
Teleport tweet media
English
0
0
0
71
Teleport
Teleport@goteleport·
Ev remembers the exact Tuesday COVID hit and killed our pipeline overnight. But demand for Teleport — a free open source tool we'd been using as a lead magnet — exploded. It became the whole company. Now the same thing is happening with AI agents, and we were already built for it. Ev calls it COVID 2.0. The full story: saasclub.io/podcast/open-s…
Teleport tweet media
English
0
0
0
74
Teleport
Teleport@goteleport·
"I'll clean it up later." Gus on why that habit doesn't work when AI is producing 10x the volume – and how sprawl gets amplified before anyone notices it.
English
0
0
0
76
Teleport
Teleport@goteleport·
An AI agent deleted an entire production environment. Not because it was hacked – because nobody told it not to. Mayur Pipaliya on why that's exactly the problem Teleport was built to prevent.
English
0
0
0
92
Teleport
Teleport@goteleport·
Mukund Cadambi (Coalfire) is bringing a practical framework for securing agentic AI to Teleport Identity Summit London, May 13. Register → goteleport.com/identity-summi…
Teleport tweet media
English
0
0
0
65
Teleport
Teleport@goteleport·
Move fast or stay compliant? At @Wise, Teresa To has had to figure out how to do both. She's joining the panel on scaling secure access at Identity Summit London, May 13. Register → goteleport.com/identity-summi…
Teleport tweet media
English
0
0
0
68
Teleport
Teleport@goteleport·
Most companies deploying AI agents are doing it on top of an identity stack that was never designed for them. Teleport was built around a simple idea: fragmenting identity by type — human, machine, agent — is where security breaks down. One layer, everything in it. That turned out to be exactly the right bet. Ev on why agentic security is the conversation every infrastructure team is having right now: saasclub.io/podcast/open-s…
Teleport tweet media
English
0
0
1
42
Teleport
Teleport@goteleport·
3,500+ identity pros. 4 days of insights. 1 massive event. We’re heading to Identiverse 2026 in Las Vegas (June 15–18) and we want to see you there. Stop by, say hi, and let’s dive into the next generation of identity security together. Save on your registration: 🎟️ Code: IDV26-TELEPORT20 🔗 Link: invt.io/1lxbg6kfya8
Teleport tweet media
English
0
0
0
36
Teleport
Teleport@goteleport·
SOC + PCI + ISO — and still moving fast. Brian Shaw (SVP Infra, @UpholdInc) is sharing how he built an access model that satisfies auditors without freezing the team. Teleport Identity Summit London. May 13th @ The Shard. Register → goteleport.com/identity-summi…
Teleport tweet media
English
0
0
0
70
Teleport
Teleport@goteleport·
Can your logs tell when AI — not a human — is driving infrastructure access? Abe Ingersoll (CISO, THG Ingenuity) has been running those experiments. He's bringing the findings to Teleport Identity Summit London on May 13. Register → goteleport.com/identity-summi…
Teleport tweet media
English
0
0
0
61
Teleport
Teleport@goteleport·
The first Teleport Enterprise deal was closed on an improvised cold call. A stranger found Ev's number, asked what it would cost to add one small feature to our free open source tool. Ev had no price in mind so said "25." Hundreds or thousands? Thousands. Per month or per year? Per year. Guy said yes. That $25k call built what's now an 8-figure ARR business. Full story: saasclub.io/podcast/open-s…
English
0
0
0
82
Teleport
Teleport@goteleport·
OAuth was designed for a human reading a consent screen. Enterprise MCP has an LLM deciding which scopes it needs at runtime. That's a different trust model entirely, and the spec is still catching up. goteleport.com/blog/complicat…
Teleport tweet media
English
0
0
0
53
Teleport retweetledi
Chris Short
Chris Short@ChrisShort·
Most teams I talk to are somewhere between "we're piloting AI agents" and "leadership wants agents in prod next quarter." Almost none of them have figured out what that actually does to their access model. Here's the thing nobody wants to say out loud: your existing IAM wasn't built for this. Static credentials, long-lived tokens, service accounts shared between three teams — that model barely holds together for humans and scripts. Autonomous agents act continuously. They spin up at machine speed, touch real infrastructure, and make decisions without waiting for a PR review or a Slack reply. The blast radius when something goes wrong is different. And your audit trail? Probably nonexistent, because nobody thought to build one for non-human actors. What actually needs to change: agents need their own cryptographic identity — not borrowed credentials, not impersonation chains, not a token that's been sitting in a config file since the last team handoff. Access needs to be enforced at runtime, not assumed from a role set up six months ago. And you need attribution: who authorized this agent, what did it touch, when, and why. That's what Teleport is solving with Beams. Each agent runs in an isolated Firecracker VM with built-in identity and zero secrets stitched in by hand. Every action is audited. Fast to start, locked down by default. MVP drops April 30th — early access is open now. If you're being pushed to get agents into production and "we'll sort out security later" is still the plan, that's worth reconsidering before it bites you. 👉 fandf.co/4selQQx Sponsored by @goteleport
English
0
1
2
246