Webinar: Migrating to a Zero Trust architecture with TailscaleSign up now
Get started - it's free!
Login
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2025 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.

Secure remote access

Access to any resource, anywhere in the world

Reliable and easy access to shared resources like containers, VMs, and bare metal without additional hardware to manage.

Remote access image with admin and terminal windows

Trusted by 10,000+ global companies

Globe lock icon

Secure connections across every user, machine, container, VM, bare metal, and Kubernetes cluster—anywhere. Automate access to critical infrastructure.

Terminal icon

Streamline development with the ability to SSH to any device without extra bastions to manage, public IPs, or high latency.

Lock icon

Replace your insecure legacy VPN—get fine-grained access control with ACLs. Integrate and streamline with device posture, group syncs, mobile device management (MDM), just-in-time (JIT) access, and more.

Reduce access complexity

Create one secure, shared network to SSH into resources across Google’s GCP, Amazon’s AWS, Microsoft’s Azure, on-prem, and hybrid. Compatible with any environment and OS including Windows, Mac, Linux, and more.

An image showing several environments all connected together
An image showing several environments all connected together

Better collaboration across every user and machine, anywhere. Toss out VPN gateways and bastion hosts for direct connections with better performance. Gain ease of management and flexibility with performant and reliable connections.

Secure access built with developers in mind

Map of world with Tailscale other nodes overlaid

Easily manage shell access to any Linux-based infrastructure and reduce the risk of mismanagement that comes with static SSH keys and manual sharing and rotation.

Command line icon

No need to generate, distribute, and manage SSH keys. Rotate keys with a single command. Encrypt all connections by default.

Checklist icon

SSH from any device and across operating systems. Answer an on-call emergency from anywhere.

IdP user icon

Keep your existing identity provider (IdP) and multi-factor authentication for streamlined and secure access.

Use a modern Business VPN

Map of world with Tailscale other nodes overlaid

Keep firewall ports closed, connections open, and under your direct control. Tailscale encrypts everything end-to-end, via WireGuard point-to-point tunnels. No more cloud MITM.

Globe icon

Connect your team in minutes with no complex configs. Seamless integration with your existing infrastructure puts secure access at your fingertips.

Lock icon

Built on WireGuard®, for fast, encrypted connections without the friction of traditional VPNs. Stay secure without sacrificing performance.

Globe icon

From startups to enterprises, global businesses rely on Tailscale’s VPN alternative to keep their teams securely connected—whether they’re in the office, working remotely, or on the go.

Pricing that works for everyone

Personal

For individuals who want to securely connect personal devices, for free.

$0per active user/month
Get started for free
Starter

For small teams seeking an easy-to-use and quick-to-deploy secure network access solution.

$6per active user/month
Get started for free
Premium

For growing teams seeking advanced service/resource-level networking and identity-aware access controls.

$18per active user/month
Get started for free
Enterprise

For organizations seeking advanced user and posture management, robust compliance, and dedicated support.

Frequently asked questions

Over 10,000 Engineering & IT teams use Tailscale’s networking software to secure their work from anywhere, reduce developer disruption, and protect critical infrastructure. Want to learn more? Read our frequently asked questions, or talk to a member of our team.

Setting up a Business VPN requires careful planning and consideration of several factors, including:

  • Network architecture: The VPN should be integrated into the organization’s existing network architecture.
  • Security protocols: The VPN should use secure protocols such as SSL/TLS or IPsec to encrypt internet traffic.
  • Authentication: The VPN should use multi-factor authentication to ensure that only authorized users can access the company network.
  • Network segmentation: The VPN should be configured to segment the network into different zones, each with its own access controls and security policies.
  • Monitoring and maintenance: The VPN should be regularly monitored and maintained to ensure that it is functioning correctly and securely.

Check out our docs.