APERTURE IS NOW AVAILABLE - START BUILDING WITH AI SAFELY IN MINUTES, NO WAITLIST.Read more →
  • Blog
  • Docs
  • Download
  • Contact Sales
  • Meet Tailscale

    • How Tailscale Works
    • WireGuard® for Enterprises
    • Features
    • Integrations
    • Docs
    • Download
    • Compare Tailscale

    Products

    • Business VPN
    • PAM
    • CI/CD Connectivity
    • Secure Access to AI
    • Cloud Connectivity
    • Workload Connectivity
    • Edge & IoT
    • Homelab
    aperture dashboard

    Aperture by Tailscale

    Unified AI governance for AI agents and users.

    Tailscale Winter Update

    The latest improvements on Aperture, Peer Relays, Services, and more.

    Read more
  • Customer Stories

    • Instacart
    • Cribl
    • Mercury
    • Hugging Face
    • All Customer Stories
  • Join the Community

    • Tailscale Insiders
    • Community Projects
    • Bring Tailscale to Work

    Events

    • Events and Webinars
    • TailscaleUp

    Learn more

    • Docs
    • Blog
    • Changelog
    • Press

    Join us at TailscaleUp

    Tailscale’s conference for engineering, security, and IT leaders.

    Learn more
  • Partner Opportunities

    • Become a Partner
    • Community Projects
    • Integrations
    • Contact Partnerships Team
  • Pricing
  • Login
  • Get started - it's free!
  • Blog
  • Docs
  • Download
  • Contact Sales
Platform

Meet Tailscale

  • How Tailscale Works
  • WireGuard® for Enterprises
  • Features
  • Integrations
  • Docs
  • Download
  • Compare Tailscale

Products

  • Business VPN
  • PAM
  • CI/CD Connectivity
  • Secure Access to AI
  • Cloud Connectivity
  • Workload Connectivity
  • Edge & IoT
  • Homelab
Customer Stories

Customer Stories

  • Instacart
  • Cribl
  • Mercury
  • Hugging Face
  • All Customer Stories
Community

Join the Community

  • Tailscale Insiders
  • Community Projects
  • Bring Tailscale to Work

Events

  • Events and Webinars
  • TailscaleUp

Learn more

  • Docs
  • Blog
  • Changelog
  • Press
Partnerships

Partner Opportunities

  • Become a Partner
  • Community Projects
  • Integrations
  • Contact Partnerships Team
Pricing
  • Login
  • Get started - it's free!

Company

  • About Tailscale
  • Careers
  • Press
  • Open Source

Help & Support

  • Support
  • Sales
  • Partnerships
  • Security
  • Changelog
  • Tailscale Status

Legal

  • Terms of Service
  • Privacy Policy
  • California Notice
  • Cookie Notice
  • All Legal

Social

  • Discord
  • GitHub
  • LinkedIn
  • Mastodon
  • Reddit
  • YouTube
  • X (Twitter)
© 2026 Tailscale Inc.
Tailscale is a registered trademark of Tailscale Inc. | WireGuard is a registered trademark of Jason A. Donenfeld

Cloud connectivity

Seamless networking within and across cloud providers

Bridge complex hybrid environments with our mesh overlay network across any cloud, on-prem solutions, or Kubernetes clusters.

Create a free accountContact us

Trusted by companies like these

  • Hugging face logo
  • Instacart logo
  • Mercari logo
  • Cribl logo
Two server towers from different cloud providers and a list of resources running on each, connected via Tailscale.

Everything just easily connects with Tailscale

Simplify all cloud connectivity through Tailscale, unifying across providers and regions.

Two groups of networked resources at AWS and Google VPC's and a group of employee devices that can connect to them.
A variety of users directly connecting to network resources though Double NAT and firewalls via Tailscale.

Simplify networking within hybrid cloud environments

Get an identity-aware, private mesh overlay that connects users, services, and workloads. Stop relying on public IPs, exposed ports, or complex firewall rules.

Get startedContact us
A user connecting to cloud resources securely connected across the globe.

Enable seamless, identity-first connectivity across cloud providers

Whether it’s across cloud service providers, on-prem environments, Kubernetes clusters, or different regions, Tailscale provides a unifying infrastructure with a single, secure mesh. Stop the headaches around complex peering, VPN switching, route tables, NAT gateways, or public exposure.

Get startedContact us

Unify and simplify cloud access

Connect everything together without worrying about network architecture.

Unify and simplify cloud access

Connect everything without worrying about network architecture

Bridge hybrid environments

One cloud, multiple clouds, on-prem, Tailscale’s mesh overlay network connects it all.

Identity-first connectivity

Identity persists end-to-end, without disappearing at a concentrator node.

Easy access to every cloud

It doesn’t matter which cloud, developers can access what they need without stress.

Get developers what they need

From a Kubernetes cluster to an AWS EC2 instance, Tailscale connects anything.

No performance bottlenecks

No more slow or dropped connections. Tailscale just works in any environment.

Least-privilege access for CI workflows

Control access per runner and repo with Grants and Tailscale’s adaptive policy engine.

Secure Kubernetes access

Tailscale Kubernetes Operator grants access to services without making them public.

Production infrastructure access

Secure access to production infrastructure, wherever it may live.

End-to-end encryption

Every connection is secure, whether you’re connecting to cloud, on-prem, or hybrid.

Log it all

Log streaming, session recordings, and more, for all your connections.

Zero Trust networking

Every connection is identity-aware, and granular access control for every device.

What our customers are saying about Tailscale

Hugging face logo

“One of my favorite things about Tailscale was how fast I could start building out our networks. Provisioning resources manually can be very time-consuming, and the ability to fit into existing IaC workflows made deploying our network infrastructure easy.”

Guillaume Legendre

DevOps Engineer

Cribl logo

“Every IT team wants to implement zero trust, but it’s always on the other side of the horizon. Tailscale’s overlay network for enterprises brings us one step closer to making it a reality. Now our teams can work on mission-critical projects without worrying about security gaps and tedious configurations.”

Clint Sharp

Co-founder and CEO

Zego logo

“Trying to set up a traditional VPN resulted in our team spending a lot of time with support … we wanted a hassle-free VPN that will always be on while protecting our services, and is transparent to the end user. Buying Tailscale and getting that 25th iteration level of product completion on day one was a better deal for everyone.”

Bart Swedrowski

Director of Systems Engineering

Questions and answers

Tailscale's mesh overlay network connects resources across AWS, Azure, GCP, and on-prem infrastructure without complex VPN configurations or peering arrangements. Every connection is identity-aware and authenticated, eliminating the need for public IPs, exposed ports, or complicated firewall rules. You get seamless access to cloud resources through a single secure mesh that works across any cloud provider or region.

The Tailscale Kubernetes Operator lets you grant secure access to services running in your clusters without exposing them publicly. Access is identity-aware and controlled through Tailscale's ACL policies, so you can define exactly who can reach which services. This works across any Kubernetes distribution including EKS, AKS, and GKE, giving your team safe access to production workloads without complex ingress configurations.

Tailscale's adaptive policy engine works with Grants to provide time-bound, least-privilege access to production systems. Teams can request access to specific resources when needed, and permissions automatically expire after use. This reduces the attack surface by eliminating standing privileges while maintaining developer productivity. Access requests can be automated per runner and repository for CI workflows, ensuring secure access without slowing down your deployment pipeline.

A mesh overlay network creates direct, encrypted connections between devices and resources across different networks without requiring changes to existing infrastructure. Each node in the mesh can communicate peer-to-peer, eliminating the need for centralized VPN concentrators or complex network peering arrangements. For hybrid cloud environments, mesh networks let you connect on-premises servers, AWS EC2 instances, Azure VMs, and GKE clusters as if they're on the same private network. Traffic routes through the fastest path automatically, and identity-based access controls work consistently across all locations.

Database access control without credential exposure requires identity-aware proxying where authentication happens before connection establishment. Instead of sharing database passwords or opening ports to the internet, modern access solutions authenticate users and services based on identity, then broker connections without revealing underlying credentials. This approach supports credential rotation without breaking connections, provides query-level audit logs, and enables just-in-time access where database permissions are granted temporarily and automatically revoked. Works across PostgreSQL, MySQL, MongoDB, and other database systems in cloud or on-premises environments.

Secure remote access for DevOps replaces VPN clients with identity-based authentication where access is granted per resource rather than per network. Developers authenticate once using their identity provider (like Okta or Google Workspace), then get access to specific servers, databases, and Kubernetes clusters based on their role. This works seamlessly with CI/CD pipelines, allowing GitHub Actions runners or GitLab CI to authenticate and access infrastructure with time-bound credentials. No VPN client configuration needed, no shared SSH keys, and access can be automatically revoked when sessions end or when developers leave the team.

Pricing that works for everyone

Personal

For individuals who want to securely connect personal devices, for free.

$0per active user/month
Get started free
Starter

For teams or organizations looking for an easy-to-use, secure, legacy VPN replacement.

$6per active user/month
Get started free
Premium

For companies who need service and resource level authentication and access control.

$18per active user/month
Get started free
Enterprise

For companies who need advanced integrations, compliance and support for access control at scale.

Custom
Contact sales

Drop your VPN,
Not your standards.

Get startedContact us