[Aug 6 Webinar] Scaling Tailscale programmatically with IaC
Get started
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2024 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.

Turnkey ZTNA for IT teams

Tailscale modernizes secure remote access and streamlines networking and security for your entire IT organization.

Tailscale for IT teams

Trusted by IT teams at companies like these


Secure remote access for IT teams of every size

IT teams from startups to enterprises choose Tailscale to vastly simplify secure remote access, dramatically reduce support tickets, and power innovation across their business.

Protect users

Deliver a VPN your end users will love

Create an end-to-end encrypted mesh network built on WireGuard®, delivering lower latency and higher reliability than traditional VPNs.
Tailscale works with everything

Tailscale works with everything

Backed by 100+ technology integrations. Leverage your existing identity provider to get started fast, without any additional technology overhead.
Protect users

World-class support and flexible pricing

Tailscale scales with the needs of your IT organization with flexible pricing plans and the backing of world-class support.

Modernize networking across your organization

transform your VPN

Transform your VPN

Rapidly deploy a mesh-based VPN that improves availability and performance for your users.

reduce support tickets

Reduce Support Tickets

Dramatically cut down on support tickets related to end user connectivity problems and focus on more strategic digital transformation initiatives.

increase security

Increase Security

Granularly control access with ACLs and security policies, seamlessly integrate with your mobile device management (MDM) solution, and ensure device posture checking.

Trusted by IT Teams worldwide

Full network modernization for IT teams

Users Management

SSO & MFA with IdP

SSO & MFA with IdP

Users can authenticate using one of our supported identity providers to access the tailnet.

Learn more

User & group provisioning (SCIM)

Sync users and group settings from one of our supported IdPs to keep ACLs up-to-date.

On-demand access

Partner integrations allow administrators to provide time-bound, elevated privileges for users.


Device Approval

Require devices to be approved by an administrator before joining the tailnet.

Mobile Device Management

Set up Tailscale for your business needs with UI customization, auto-updates, runtime configurations and more, all integrated with your favorite Mobile Device Management solution.

Device posture management

Collect device attributes and use them as part of connectivity rules within your Tailnet to limit access for devices that do not meet security requirements.


Access controls lists (ACLs)

Access controls lists (ACLs)

Create RBAC policies to determine which users, roles, or groups can access, which nodes on your tailnet.

Learn more

ACL Tests

Verify ACLs provide sufficient coverage against unnecessary exposure.

GitOps for ACLs

Manage ACLs version control within a CI/CD workflow using GitHub or GitLab.

Tailnet Lock Alpha

A predetermined trusted node must verify the trusted keys of any nodes attempting to join your tailnet.

Network access

Kubernetes operator

Kubernetes operator

Connect services and encrypt communications across heterogeneous environments

Learn more
App connectors

App connectors

Secure third-party SaaS applications by restricting access to authorized users.

Learn more

Regional routing

Increase performance with high availability across complex networks

Exit nodes

Route all traffic through a designated egress point, similar to a privacy VPN.

End-to-end encryption

Tailscale uses WireGuard® protocols for end-to-end encryption.


SSH session recording

SSH session recording

Store any Tailscale SSH session recording long-term in any S3-compatible service or local disk.

Learn more

Configuration audit logging

Surface what configuration-based actions occurred, by whom, and when.

Network flow logging

Surface what node-to-node interaction occurred, and when.

Log streaming

Natively stream configuration or network flow logs to our SIEM integration partners.

Try Tailscale for free

Schedule a demo
Contact sales
cta phone
Hugging Face