Border0 joins Tailscale - FAQs
Tailscale has long focused on making secure connectivity simple: identity-based access, strong encryption, and policy controls that work across real-world networks. Border0 brings deep experience in privileged access workflows and auditability. Together, we’ll move faster on a modern approach to privileged access management, with less complexity and more usability.
This FAQ covers the most common questions. If you need help choosing an approach for your environment, please contact our team.
What’s changing
What is happening with Border0 and Tailscale?
Border0 is now part of Tailscale. The Border0 team has joined Tailscale, and together we’ll be building deeper infrastructure access capabilities as part of our privileged access management offering.
Why does this matter for you?
It builds on a foundation of secure connectivity to deliver the capabilities many teams want next, such as a simpler way to manage access to sensitive systems with stronger visibility and clearer audit trails. Border0 adds mature building blocks for access workflows and session visibility, while Tailscale provides the trusted identity and connectivity foundation teams already depend on.
What kinds of problems does this help solve?
This helps teams securely manage privileged access to critical infrastructure, such as servers, clusters, admin environments, and databases, by providing stronger controls over who can access what, along with better visibility into what happens during each session.
Border0 product and availability
Is Border0 still available?
Yes. Border0 continues to be available and supported, and the team is now part of Tailscale.
How does Border0 relate to Tailscale?
Border0 integrates with Tailscale, building on the same identity and connectivity foundation. Over time, you’ll see us bring these capabilities closer together as we expand Tailscale’s native privileged access management offering.
What capabilities does Border0 support?
Border0 is designed for infrastructure access workflows and visibility, including support for common access patterns such as SSH and Kubernetes access, remote admin workflows (RDP and VNC), database access controls, session recording, and command or query visibility.
If you’re evaluating privileged access management now, talk to us about Border0, and we can help you understand what’s available.
Customers and support
I’m a Border0 customer. Who do I contact with questions?
Please continue using Border0’s existing support channel at support@border0.com.
I’m a Tailscale customer. Who do I contact with questions?
Please reach out to our sales and solutions engineering team
Looking ahead
Is this a new product launch?
This announcement is about Border0 joining Tailscale and the direction we’re investing in. We’ll share product updates as capabilities become available.
When will capabilities be available inside Tailscale?
We’ll bring capabilities together over time and share more details as they’re ready, with a focus on delivering a cohesive experience that meets the Tailscale quality bar.
How is this different from traditional PAM tools?
Many traditional PAM approaches are heavyweight and add friction to everyday workflows. Our goal is to deliver strong controls and auditability built on identity-based connectivity, so teams can improve security without introducing additional operational complexity.
