Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Teleport: Because SSH Keys Are So Last Decade

Truth in IT
05/09/2025
60
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett Small World Big Data. We are here at RSAC 2025 with all the latest and greatest cybersecurity vendors. We're looking at all the new ways that people can think about security and come at the problem from from aggressive and innovative angles. We've got Teleport here. This is some interesting stuff. I'm not sure I'm going to get all the terminology right about what you guys are doing, but tell us a little bit about where Teleport fits into cybersecurity picture. Cheers. Thanks, Mike. So Teleport is an infrastructure identity access platform. We have three products a zero trust solution identity governance and identity security to understand the scope. All right. So let's walk through those just a little bit. We'll say uh identity. Uh are you talking about like people doing access controls. Are you talking about services. You're talking about bots who has identity? Yeah, we're talking about identity for everything. Both humans, machines and also MCP servers, which we're announcing today. Rsa. Mcp service. Sounds interesting. Uh, tell me a little bit more. That's with particular emphasis on some of the themes going on here at RSA, right? Yeah. So, uh, Teleport started providing secure access to individuals and developers using short lived certificates. We've expanded this to machines and non-human identities. And what we're seeing is people are also using their identity and access to give access to AIS. And so we now have the ability to monitor, control who is accessing on their behalf the data that they might inspect. All right. So this is the AI tie in. You're helping you're helping secure AIS for good on that side of things. Uh, is this something that a lot of customers are coming to you and asking for? Is this something you see as particularly growing in vulnerability? Uh, no. It's something that we actively see, um, you know, along with server access and Kubernetes, we also have databases and databases often, like the goldmine with any organization. And people want to make sure that, you know, both users, machines and AIS are accessing the appropriate amount of information within the databases. Yeah. Uh, does your security, when you're giving these certificates, uh, go down to a granular level on something like a database? How do you control that? Yeah, it goes at the protocol level. And so we get full information about what's happening at the protocol level. And that's for all of our services. Okay. At the protocol level, uh, is this good in a hybrid environment, would you say to like, if I've got, uh, distributed operations and you mentioned Kubernetes, microservices all over. Yeah. It's perfect. Our customers both run it on premise self-hosted. We also have like a FedRAMP edition, so it's helping secure environments in the government. And we also have Enterprise Cloud hosted edition as well. All right. That's great. Looking at the RSAC show, if there's something you wanted to tell everybody that's here about Teleport and make sure that was something they walked away with in their minds, what would that be? Yeah, I think the one thing from this show is it's really to start with the basics. You know, there's lots of hype around AI, but, you know, are you using MFA? Are you using like an IDP? Are you if you're thinking about rotating credentials, there might be other solutions using certificates or something else to move away from secrets. And there's lots of synchronous options. So yeah. So this is really more of like a zero trust approach to issuing access to systems where you're not saying, here's a secret, let me embed it in something, but here's a certificate specifically for you for what you're doing, including AI now. Yep. That's right. All right. I just wanted to summarize that because that's a mouthful of stuff. If you wanted to sort of tell people where to start. Say they're they're not sure about AI in particular what they're securing yet? What would they do first? Yeah. So people want to get started. They can just go to go Teleport. Com. We have a 14 day enterprise trial. We're also an open call company. So you can just download our code on GitHub. We have people running in their home lab and we find people they start in their home lab and they start and they go to their fortune 100 company. All right. So that sounds like a lot of great stuff. And you just mentioned some some websites go Teleport. Com. Uh, is there anything specific to security. You might point somebody out who's like worried about maybe coming from a CISO perspective on this? Uh, yeah. We have an identity security product. And this is understanding the scope of who has access to what in your infrastructure and what are they up to. And we see lots of blind spots that are not covered within the traditional CISO checklist. And so these can be like standing privilege. It can be also insider threats. And our identity security product is perfect for sort of identifying these and helping people detect on things that they may not know. So getting it really locked down. Well thank you, Ben. Thank you very much. Thank you Mike. All right. Check it out. Teleport.

Mike Matchett talks with Ben Arent of Teleport at RSAC 2025 about securing identity across humans, machines, and AI. Teleport offers protocol-level visibility and certificate-based access controls, enabling zero trust at scale—even in hybrid, multi-cloud, and Kubernetes environments. The conversation dives into AI access control, short-lived credentials, and how CISOs can eliminate standing privileges. Teleport’s identity security platform offers a practical foundation for securing today’s complex infrastructure—one identity at a time.

Categories:
  • » Small World Big Data
  • » Cybersecurity
  • » Cybersecurity » Identity & Access Management (IAM)
  • » Cybersecurity » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • teleport
  • cybersecurity
  • identity
  • security
  • zero
  • trust
  • machine
  • identity
  • certificate-based
  • access
  • kubernetes
  • security
  • access
  • control
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Teleport: Because SSH Keys Are So Last Decade

            Upcoming Spotlight Events

            • Jul
              16

              How Privileged Access Really Works in Modern Windows Environments

              07/16/202501:00 PM ET
              • Jul
                29

                QR Codes Exposed: From Convenience to Cybersecurity Nightmare

                07/29/202501:00 PM ET
                More events

                Upcoming 360 View Events

                • Jul
                  24

                  360View: API Security & the Expanding Attack Surface

                  07/24/202512:00 PM ET
                  • Aug
                    21

                    360View: HCI, Cloud, and Virtualization: What’s Next?

                    08/21/202512:00 PM ET
                    • Sep
                      25

                      360View: Email Security & Social Engineering Defense

                      09/25/202512:00 PM ET
                      More events

                      Upcoming Industry Events

                      • Jul
                        10

                        Discover the Latest Features of Netwrix 1Secure for MSPs

                        07/10/202501:00 PM ET
                        • Jul
                          23

                          Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                          07/23/202501:00 PM ET
                          More events

                          Recent Industry Events

                          • Jun
                            26

                            Discover Wallarm's Innovative Approach to Safeguarding Modern APIs and Agentic AI

                            06/26/202501:00 PM ET
                            • Jun
                              25

                              Adapting to Emerging Threats: Strategies for Detection, Response, and Resilience

                              06/25/202501:00 PM ET
                              • Jun
                                04

                                Rubrik FORW>>RD

                                06/04/202501:00 PM ET
                                More events
                                Truth in IT
                                • Advertise
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Be Our Guest
                                • Preference Management
                                Desktop version
                                Standard version