ºÚÁÏÊÓÆµ

99% of companies want to ditch their VPN. See why in our 2025 Zero Trust ReportRead more
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2025 ºÚÁÏÊÓÆµ. All rights reserved. ºÚÁÏÊÓÆµ is a registered trademark of ºÚÁÏÊÓÆµ.

ºÚÁÏÊÓÆµ for DevOps

ºÚÁÏÊÓÆµ, a virtual private programmable network

A world map with groups of devices all connected to the ºÚÁÏÊÓÆµ logo

Trusted by 10,000+ companies like these

Connect to VMs and containers via SSH

Command line window showing an active SSH connection
An illustration of a key

Instead of self-managing or sharing keys across an entire fleet of machines, use ºÚÁÏÊÓÆµ SSH to automatically rotate SSH keys, while validating user identities against an existing IdP (e.g Google Workspace or Okta).

Two diagonal arrows pointing towards each other, but not touching

ºÚÁÏÊÓÆµ establishes end-to-end encrypted connections between any two devices on the internet without opening sensitive ports to the world, so go ahead and DROP all INPUTs.

An icon of a stylized database with a backwards rotating arrow

Meet compliance obligations, or just debug what happened last week, with the ability to record and replay ºÚÁÏÊÓÆµ SSH sessions.


Connect Kubernetes Clusters

A diagram showing a code editor, a command line window and a chart connecting users to different network environments
Kubernetes' seven-sided polygon logo, with a boat wheel in the middle

Use ºÚÁÏÊÓÆµâ€™s operator to seamlessly connect clusters with other infrastructure, including: logging, CI / CD workflows, other internal APIs, and managed databases.

An illustration of a stylized chain

Quickly enable secure access to dev, test, staging, and production environments. SCIM group sync and just-in-time access make it easy to provide the right access at the right time.

An illustration of a stylized globe secured by a padlock

Connect a cluster with ºÚÁÏÊÓÆµ to drop the risky public IP for the control plane. With minimal configuration it’s possible to securely manage & debug clusters from anywhere.

Webinar

Watch our webinar on using ºÚÁÏÊÓÆµ for Kubernetes networking

Find out how ºÚÁÏÊÓÆµ can make your your life with Kubernetes hassle-free.

Exploring ºÚÁÏÊÓÆµ with Kubernetes video thumbnail

Connect CI / CD Pipelines

Flow chart showing a user updating code to be tested by a runner, and logged to a database
An illustration of a triangle with an exclamation mark centered inside

SSH into CI / CD job runners to diagnose build issues without the complexity of managing or sharing keys. ºÚÁÏÊÓÆµ SSH takes all the hassle out of key management and easily integrates with existing identity providers.

An illustration of two arrows following the path of a circle, pointing clock-wise

Easily & securely connect cloud or local CI / CD runners to internal services and test databases across clouds, VPCs, or regions.


A Network of Benefits

An illustration of the earth showing various devices located across the globe, connected by arching lines

Securely connect anything on the internet with ºÚÁÏÊÓÆµ. Create a unified, secure network that bridges all of your machines regardless of their physical location or the network topology between them.

Use ºÚÁÏÊÓÆµâ€™s drop in SSH replacement to easily manage shell access to any linux based infrastructure. Verify user identities against an existing IdP (e.g Google Workspace or Okta) and manage access via centralized grants and access control lists (ACLs).

An image of a browser window showing the login screen for the ºÚÁÏÊÓÆµ admin console, with IDP provider logos in a grid behind it
In illustration connecting three different infrastructure as code providers, Terraform, Pulumi and Ansible connecting to a server environment through an example code snippet

ºÚÁÏÊÓÆµ seamlessly integrates into any GitOps workflow with support for popular Infrastructure as Code (IaC) tools like Terraform, Pulumi, and Ansible. Using native integrations, both deployment and network access policies can be checked into version control for easy review and rollbacks.

Easily install ºÚÁÏÊÓÆµ on every machine and in every cluster to enable authenticated & direct connections, encrypted end-to-end, between any two machines or users. Customize network access with fine-grained control based on user identity, source machine, and custom tags.

A flow chart connecting a user to different SaaS tools and other resources, with each group of tools only accessible to a certain group of people

Get these features and more with ºÚÁÏÊÓÆµ

An icon of a command line interface window

Use this drop-in replacement to manage & record shell access into any linux machine without needing to share or manage keys.

A stylized wrench icon

Quickly route traffic to & from Kubernetes clusters to your Tailnet while keeping services and the control plane off the public internet.

Two arrows passing downwards through a circle then diverging left and right

Establish connectivity to entire VPCs or devices where ºÚÁÏÊÓÆµ can't be installed.

An icon of a left and right angle bracket

Easily deploy ºÚÁÏÊÓÆµ into cloud and on-prem environments via your IaC provider of choice, including: Terraform, Pulumi, and Ansible.

The Git branch icon, one vertical line and one curved branching line pointing upwards

Easily modify and rollback JSON based network configuration directly from GitHub or GitLab.

A stylized globe icon

Quickly & securely share prototypes, demos, or web applications with other users on a Tailnet regardless of location or network.

A stylized padlock icon

By installing the ºÚÁÏÊÓÆµ client, all traffic is encrypted end-to-end using the Wireguard® protocol.

A stylized silhouette of a person next to a checkmark

Use SSO & MFA from a wide array of supported IdPs to authenticate users onto any Tailnet.

A horizontal line with one upward peak and one downward peak

Natively stream network flow and configuration audit logs to popular SIEM providers.


Pricing that works for everyone

Personal

For individuals who want to securely connect personal devices, for free.

$0per active user/month
Starter

For small teams seeking an easy-to-use and quick-to-deploy secure network access solution.

$6per active user/month
Premium

For growing teams seeking advanced service/resource-level networking and identity-aware access controls.

$18per active user/month
Enterprise

For organizations seeking advanced user and posture management, robust compliance, and dedicated support.