Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Teleport: Because SSH Keys Are So Last Decade

Truth in IT
05/09/2025
72
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett Small World Big Data. We are here at RSAC 2025 with all the latest and greatest cybersecurity vendors. We're looking at all the new ways that people can think about security and come at the problem from from aggressive and innovative angles. We've got Teleport here. This is some interesting stuff. I'm not sure I'm going to get all the terminology right about what you guys are doing, but tell us a little bit about where Teleport fits into cybersecurity picture. Cheers. Thanks, Mike. So Teleport is an infrastructure identity access platform. We have three products a zero trust solution identity governance and identity security to understand the scope. All right. So let's walk through those just a little bit. We'll say uh identity. Uh are you talking about like people doing access controls. Are you talking about services. You're talking about bots who has identity? Yeah, we're talking about identity for everything. Both humans, machines and also MCP servers, which we're announcing today. Rsa. Mcp service. Sounds interesting. Uh, tell me a little bit more. That's with particular emphasis on some of the themes going on here at RSA, right? Yeah. So, uh, Teleport started providing secure access to individuals and developers using short lived certificates. We've expanded this to machines and non-human identities. And what we're seeing is people are also using their identity and access to give access to AIS. And so we now have the ability to monitor, control who is accessing on their behalf the data that they might inspect. All right. So this is the AI tie in. You're helping you're helping secure AIS for good on that side of things. Uh, is this something that a lot of customers are coming to you and asking for? Is this something you see as particularly growing in vulnerability? Uh, no. It's something that we actively see, um, you know, along with server access and Kubernetes, we also have databases and databases often, like the goldmine with any organization. And people want to make sure that, you know, both users, machines and AIS are accessing the appropriate amount of information within the databases. Yeah. Uh, does your security, when you're giving these certificates, uh, go down to a granular level on something like a database? How do you control that? Yeah, it goes at the protocol level. And so we get full information about what's happening at the protocol level. And that's for all of our services. Okay. At the protocol level, uh, is this good in a hybrid environment, would you say to like, if I've got, uh, distributed operations and you mentioned Kubernetes, microservices all over. Yeah. It's perfect. Our customers both run it on premise self-hosted. We also have like a FedRAMP edition, so it's helping secure environments in the government. And we also have Enterprise Cloud hosted edition as well. All right. That's great. Looking at the RSAC show, if there's something you wanted to tell everybody that's here about Teleport and make sure that was something they walked away with in their minds, what would that be? Yeah, I think the one thing from this show is it's really to start with the basics. You know, there's lots of hype around AI, but, you know, are you using MFA? Are you using like an IDP? Are you if you're thinking about rotating credentials, there might be other solutions using certificates or something else to move away from secrets. And there's lots of synchronous options. So yeah. So this is really more of like a zero trust approach to issuing access to systems where you're not saying, here's a secret, let me embed it in something, but here's a certificate specifically for you for what you're doing, including AI now. Yep. That's right. All right. I just wanted to summarize that because that's a mouthful of stuff. If you wanted to sort of tell people where to start. Say they're they're not sure about AI in particular what they're securing yet? What would they do first? Yeah. So people want to get started. They can just go to go Teleport. Com. We have a 14 day enterprise trial. We're also an open call company. So you can just download our code on GitHub. We have people running in their home lab and we find people they start in their home lab and they start and they go to their fortune 100 company. All right. So that sounds like a lot of great stuff. And you just mentioned some some websites go Teleport. Com. Uh, is there anything specific to security. You might point somebody out who's like worried about maybe coming from a CISO perspective on this? Uh, yeah. We have an identity security product. And this is understanding the scope of who has access to what in your infrastructure and what are they up to. And we see lots of blind spots that are not covered within the traditional CISO checklist. And so these can be like standing privilege. It can be also insider threats. And our identity security product is perfect for sort of identifying these and helping people detect on things that they may not know. So getting it really locked down. Well thank you, Ben. Thank you very much. Thank you Mike. All right. Check it out. Teleport.

Mike Matchett talks with Ben Arent of Teleport at RSAC 2025 about securing identity across humans, machines, and AI. Teleport offers protocol-level visibility and certificate-based access controls, enabling zero trust at scale—even in hybrid, multi-cloud, and Kubernetes environments. The conversation dives into AI access control, short-lived credentials, and how CISOs can eliminate standing privileges. Teleport’s identity security platform offers a practical foundation for securing today’s complex infrastructure—one identity at a time.

Categories:
  • » Small World Big Data
  • » Cybersecurity
  • » Cybersecurity » Identity & Access Management (IAM)
  • » Cybersecurity » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • teleport
  • cybersecurity
  • identity
  • security
  • zero
  • trust
  • machine
  • identity
  • certificate-based
  • access
  • kubernetes
  • security
  • access
  • control
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Teleport: Because SSH Keys Are So Last Decade

            Upcoming Spotlight Events

            • Sep
              11

              An Executive’s Guide to Secure AI Adoption

              09/11/202501:00 PM ET
              More events

              Upcoming 360 View Events

              • Sep
                25

                360View: Email Security & Social Engineering Defense

                09/25/202512:00 PM ET
                • Oct
                  23

                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                  10/23/202512:00 PM ET
                  • Nov
                    20

                    360View: Budget Optimization: Doing More with Less

                    11/20/202512:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Aug
                      19

                      CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective

                      08/19/202512:00 PM ET
                      • Aug
                        21

                        Risk in Real Time: Visibility Into Cloud Based Vulnerabilities

                        08/21/202511:00 AM ET
                        • Aug
                          25

                          Harnessing AI to Transform the Landscape of Data Security

                          08/25/202510:55 AM ET
                          More events

                          Recent Industry Events

                          • Jul
                            23

                            Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                            07/23/202501:00 PM ET
                            • Jul
                              10

                              Discover the Latest Features of Netwrix 1Secure for MSPs

                              07/10/202501:00 PM ET
                              • Jul
                                09

                                Building a Strong Data Security Framework with DLP and DSPM Strategies

                                07/09/202510:55 AM ET
                                More events

                                Upcoming Events Calendar

                                • 08/19/2025
                                  12:00 PM
                                  08/19/2025
                                  CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective
                                  https://www.truthinit.com/index.php/channel/1401/cmmc-2-0-insights-understanding-compliance-from-an-expert-auditors-perspective/
                                • 08/21/2025
                                  11:00 AM
                                  08/21/2025
                                  Risk in Real Time: Visibility Into Cloud Based Vulnerabilities
                                  https://www.truthinit.com/index.php/channel/1372/understanding-dynamic-risk-management-in-real-time-environments/
                                • 08/25/2025
                                  10:55 AM
                                  08/25/2025
                                  Harnessing AI to Transform the Landscape of Data Security
                                  https://www.truthinit.com/index.php/channel/1381/harnessing-ai-to-transform-the-landscape-of-data-security/
                                • 08/26/2025
                                  10:55 AM
                                  08/26/2025
                                  Confronting AI’s Challenges: Insights into CISOs' Biggest Concerns
                                  https://www.truthinit.com/index.php/channel/1380/confronting-ai-s-challenges-insights-into-cisos-biggest-concerns/
                                • 08/26/2025
                                  01:00 PM
                                  08/26/2025
                                  Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats
                                  https://www.truthinit.com/index.php/channel/1404/renown-health-secures-10k-mailboxes-stops-1m-in-email-threats/
                                • 08/27/2025
                                  10:55 AM
                                  08/27/2025
                                  Mastering Secure AI Implementation: A Comprehensive Executive Guide
                                  https://www.truthinit.com/index.php/channel/1379/mastering-secure-ai-implementation-a-comprehensive-executive-guide/
                                • 08/28/2025
                                  10:55 AM
                                  08/28/2025
                                  A Practitioner’s Roadmap for Safeguarding AI Implementation in Organizations
                                  https://www.truthinit.com/index.php/channel/1378/a-practitioner-s-roadmap-for-safeguarding-ai-implementation-in-organizations/
                                • 08/29/2025
                                  10:55 AM
                                  08/29/2025
                                  Ethical Frameworks and Compliance Strategies for Safe AI Implementation
                                  https://www.truthinit.com/index.php/channel/1377/ethical-frameworks-and-compliance-strategies-for-safe-ai-implementation/
                                • 09/11/2025
                                  01:00 PM
                                  09/11/2025
                                  An Executive’s Guide to Secure AI Adoption
                                  https://www.truthinit.com/index.php/channel/1374/an-executives-guide-to-secure-ai-adoption/
                                • 09/16/2025
                                  01:00 PM
                                  09/16/2025
                                  Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
                                  https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
                                • 09/25/2025
                                  12:00 PM
                                  09/25/2025
                                  360View: Email Security & Social Engineering Defense
                                  https://www.truthinit.com/index.php/channel/930/360view-email-security-social-engineering-defense/
                                • 10/23/2025
                                  12:00 PM
                                  10/23/2025
                                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                                  https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
                                • 11/20/2025
                                  12:00 PM
                                  11/20/2025
                                  360View: Budget Optimization: Doing More with Less
                                  https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
                                • 12/18/2025
                                  12:00 PM
                                  12/18/2025
                                  360View: 2026 IT Predictions & Emerging Trends
                                  https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version