Webinar: Migrating to a Zero Trust architecture with TailscaleSign up now
Get started - it's free!
Login
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2025 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.
Join us for our upcoming Zero Trust Webinar SeriesRegister now

Security

Tailscale for security teams

Abstracted product UI showing how different employee groups can access certain resources but not others

Trusted by security teams at companies like these

Safeguard users, devices, and any type of workload.

Product UI showing different authentication methods and group sync

Dynamically manage the user and group lifecycle with SCIM. Authenticate network access with SSO & MFA.

Continuously verify devices meet certain conditions to retain access to your organization’s private network.

A stylized globe showing two devices being approved before connecting to the network
A workflow showing how Tailscale SSH protects resources on VPCs

Explicitly authorize which users and services can communicate. Layer on additional security measures like SSH session recording.


Strengthen your security posture

An ACLs file being edited by one of Tailscale's on-demand access partner integrations

Provide just-in-time, time-bound, elevated access to employees such as on-call engineers using one of our partner's integrations.

Integrate EDRs like Crowdstrike to enable device identity collection and supercharge device posture by leveraging the Zero Trust Assessment score to determine trustability.

A status screen showing two devices connecting to the network, one is not approved due to a low Crowdstrike trust score
A stylized product UI showing Tailscale's many SIEM partners

Stream configuration audit logs, network flow logs, and SSH sessions into your preferred SIEM to surface any potentially anomalous activity.

Zero Trust with Tailscale

An ACLs file demonstrating how access is limited by tags and groups

Tailscale’s policy engine operates in least-privileged mode by default. Users, devices, groups, and tags must have explicitly assigned permissions for access.

Get continuous verification with machine and user identity built into every single request. Automatically maintain access levels based on user and device state.

A status screen showing two devices connecting connecting to each other after passing posture checks
A stylized product UI showing unauthorized node activity

Combine system events, network flow logs, and audit logs with SSH session recording and Tailscale's check mode to drive active assurance. Quarantine devices with known IoC in seconds.

Get these features and more with Tailscale

Lock icon

Tailscale brings end-to-end WireGuard to the networking layer, ensuring each and every connection is encrypted

App window icon

Use this drop-in replacement to manage & record shell access into any linux machine without needing to share or manage keys.

Activity icon

Stream configuration or network flow logs into a security information and event management (SIEM) system.

Angle brackets icon

Easily deploy Tailscale into cloud and on-prem environments via your IaC provider of choice, including: Terraform, Pulumi, and Ansible.

Git branch icon

Easily modify and rollback JSON based network configuration directly from GitHub or GitLab.

Checkbox icon

Define ACL tests and ensure changes don't unintentionally allow access to resources.

Laptop and phone icon

Integrate into your existing device posture management tools: CrowdStrike, SentinelOne, InTune, Jamf, Kanji and more.

Stamp icon

Review and approve new devices before they can your network.

User check icon

Tailscale works on top of your identity provider (IdP), including support for custom OpenID Connect (OIDC) providers


Pricing that works for everyone

Personal

For individuals who want to securely connect personal devices, for free.

$0per active user/month
Get started for free
Starter

For small teams seeking an easy-to-use and quick-to-deploy secure network access solution.

$6per active user/month
Get started for free
Premium

For growing teams seeking advanced service/resource-level networking and identity-aware access controls.

$18per active user/month
Get started for free
Enterprise

For organizations seeking advanced user and posture management, robust compliance, and dedicated support.