Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Teleport: Because SSH Keys Are So Last Decade

Truth in IT
05/09/2025
75
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett Small World Big Data. We are here at RSAC 2025 with all the latest and greatest cybersecurity vendors. We're looking at all the new ways that people can think about security and come at the problem from from aggressive and innovative angles. We've got Teleport here. This is some interesting stuff. I'm not sure I'm going to get all the terminology right about what you guys are doing, but tell us a little bit about where Teleport fits into cybersecurity picture. Cheers. Thanks, Mike. So Teleport is an infrastructure identity access platform. We have three products a zero trust solution identity governance and identity security to understand the scope. All right. So let's walk through those just a little bit. We'll say uh identity. Uh are you talking about like people doing access controls. Are you talking about services. You're talking about bots who has identity? Yeah, we're talking about identity for everything. Both humans, machines and also MCP servers, which we're announcing today. Rsa. Mcp service. Sounds interesting. Uh, tell me a little bit more. That's with particular emphasis on some of the themes going on here at RSA, right? Yeah. So, uh, Teleport started providing secure access to individuals and developers using short lived certificates. We've expanded this to machines and non-human identities. And what we're seeing is people are also using their identity and access to give access to AIS. And so we now have the ability to monitor, control who is accessing on their behalf the data that they might inspect. All right. So this is the AI tie in. You're helping you're helping secure AIS for good on that side of things. Uh, is this something that a lot of customers are coming to you and asking for? Is this something you see as particularly growing in vulnerability? Uh, no. It's something that we actively see, um, you know, along with server access and Kubernetes, we also have databases and databases often, like the goldmine with any organization. And people want to make sure that, you know, both users, machines and AIS are accessing the appropriate amount of information within the databases. Yeah. Uh, does your security, when you're giving these certificates, uh, go down to a granular level on something like a database? How do you control that? Yeah, it goes at the protocol level. And so we get full information about what's happening at the protocol level. And that's for all of our services. Okay. At the protocol level, uh, is this good in a hybrid environment, would you say to like, if I've got, uh, distributed operations and you mentioned Kubernetes, microservices all over. Yeah. It's perfect. Our customers both run it on premise self-hosted. We also have like a FedRAMP edition, so it's helping secure environments in the government. And we also have Enterprise Cloud hosted edition as well. All right. That's great. Looking at the RSAC show, if there's something you wanted to tell everybody that's here about Teleport and make sure that was something they walked away with in their minds, what would that be? Yeah, I think the one thing from this show is it's really to start with the basics. You know, there's lots of hype around AI, but, you know, are you using MFA? Are you using like an IDP? Are you if you're thinking about rotating credentials, there might be other solutions using certificates or something else to move away from secrets. And there's lots of synchronous options. So yeah. So this is really more of like a zero trust approach to issuing access to systems where you're not saying, here's a secret, let me embed it in something, but here's a certificate specifically for you for what you're doing, including AI now. Yep. That's right. All right. I just wanted to summarize that because that's a mouthful of stuff. If you wanted to sort of tell people where to start. Say they're they're not sure about AI in particular what they're securing yet? What would they do first? Yeah. So people want to get started. They can just go to go Teleport. Com. We have a 14 day enterprise trial. We're also an open call company. So you can just download our code on GitHub. We have people running in their home lab and we find people they start in their home lab and they start and they go to their fortune 100 company. All right. So that sounds like a lot of great stuff. And you just mentioned some some websites go Teleport. Com. Uh, is there anything specific to security. You might point somebody out who's like worried about maybe coming from a CISO perspective on this? Uh, yeah. We have an identity security product. And this is understanding the scope of who has access to what in your infrastructure and what are they up to. And we see lots of blind spots that are not covered within the traditional CISO checklist. And so these can be like standing privilege. It can be also insider threats. And our identity security product is perfect for sort of identifying these and helping people detect on things that they may not know. So getting it really locked down. Well thank you, Ben. Thank you very much. Thank you Mike. All right. Check it out. Teleport.

Mike Matchett talks with Ben Arent of Teleport at RSAC 2025 about securing identity across humans, machines, and AI. Teleport offers protocol-level visibility and certificate-based access controls, enabling zero trust at scale—even in hybrid, multi-cloud, and Kubernetes environments. The conversation dives into AI access control, short-lived credentials, and how CISOs can eliminate standing privileges. Teleport’s identity security platform offers a practical foundation for securing today’s complex infrastructure—one identity at a time.

Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Identity & Access Management (IAM)
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • teleport
  • cybersecurity
  • identity
  • security
  • zero
  • trust
  • machine
  • identity
  • certificate-based
  • access
  • kubernetes
  • security
  • access
  • control
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Teleport: Because SSH Keys Are So Last Decade

            Upcoming Webinar Calendar

            • 09/18/2025
              10:00 AM
              09/18/2025
              Netskope: La dualità dell'IA: stimolare l'innovazione e salvaguardare il futuro
              https://www.truthinit.com/index.php/channel/1444/la-dualità-dellia-stimolare-linnovazione-e-salvaguardare-il-futuro/
            • 09/18/2025
              11:00 AM
              09/18/2025
              Trend Micro Webinar: Risk in Real Time: Agentic SIEM
              https://www.truthinit.com/index.php/channel/1372/risk-real-time-agentic-siem/
            • 09/18/2025
              01:00 PM
              09/18/2025
              Netskope: Harnessing AI’s Dual Nature: Progress and Protection
              https://www.truthinit.com/index.php/channel/1424/harnessing-ais-potential-for-innovation-and-mitigating-associated-risks/
            • 09/23/2025
              01:00 PM
              09/23/2025
              Enhancing Visibility, Control, and Trust in Cloud-First Data Security Management
              https://www.truthinit.com/index.php/channel/1497/enhancing-visibility-control-and-trust-in-cloud-first-data-security-management/
            • 09/24/2025
              01:00 PM
              09/24/2025
              Transforming Risk into Resilience: Managing Data and Access in Regulated Settings
              https://www.truthinit.com/index.php/channel/1500/transforming-risk-into-resilience-managing-data-and-access-in-regulated-settings/
            • 09/24/2025
              02:00 PM
              09/24/2025
              Achieving Full Network and Application Visibility through Zero Trust with Netskope and ExtraHop
              https://www.truthinit.com/index.php/channel/1427/achieving-full-network-and-application-visibility-through-zero-trust-with-netskope-and-extrahop/
            • 09/25/2025
              12:00 PM
              09/25/2025
              Netskope: Secure the Future--AI Usage & Data Security in the Enterprise
              https://www.truthinit.com/index.php/channel/1434/ensuring-data-security-and-ai-integration-for-a-resilient-enterprise-future/
            • 10/15/2025
              01:00 PM
              10/15/2025
              Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?
              https://www.truthinit.com/index.php/channel/1521/managing-human-risk-in-an-ai-driven-threat-landscape-are-your-defenses-evolving-fast-enough/
            • 10/23/2025
              12:00 PM
              10/23/2025
              360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
              https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
            • 10/28/2025
              12:00 PM
              10/28/2025
              Netskope: Data Security Reimagined: Regain Your Control and Confidence
              https://www.truthinit.com/index.php/channel/1432/data-security-reimagined-regain-your-control-and-confidence/
            • 11/20/2025
              12:00 PM
              11/20/2025
              360View: Budget Optimization: Doing More with Less
              https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
            • 12/18/2025
              12:00 PM
              12/18/2025
              360View: 2026 IT Predictions & Emerging Trends
              https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

            Upcoming Industry Events

            • Sep
              18

              Netskope: La dualità dell'IA: stimolare l'innovazione e salvaguardare il futuro

              09/18/202510:00 AM ET
              • Sep
                18

                Trend Micro Webinar: Risk in Real Time: Agentic SIEM

                09/18/202511:00 AM ET
                • Sep
                  18

                  Netskope: Harnessing AI’s Dual Nature: Progress and Protection

                  09/18/202501:00 PM ET
                  More events

                  Upcoming 360 View Events

                  • Oct
                    23

                    360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                    10/23/202512:00 PM ET
                    • Nov
                      20

                      360View: Budget Optimization: Doing More with Less

                      11/20/202512:00 PM ET
                      • Dec
                        18

                        360View: 2026 IT Predictions & Emerging Trends

                        12/18/202512:00 PM ET
                        More events

                        Recent Spotlight Events

                        • Oct
                          21

                          DCIG Top5 AWS & Azure Cloud Backup Solutions

                          10/21/202001:00 PM ET
                          • Jan
                            21

                            NetApp: Delivering End User Computing in 2021

                            01/21/202101:00 PM ET
                            • Jan
                              28

                              HCL & Cisco: VelocITy Reference Architecture

                              01/28/202101:00 PM ET
                              More events

                              Recent Industry Events

                              • Sep
                                18

                                Netskope: La dualité de l’IA : inspirer l’innovation tout en protégeant l’avenir

                                09/18/202504:00 AM ET
                                • Sep
                                  18

                                  Netskope: Die doppelte Funktion der KI: Innovationsantrieb und Sicherheitsgarant

                                  09/18/202504:00 AM ET
                                  • Sep
                                    16

                                    HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence

                                    09/16/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version