🚢 Sun, skyline, and great company. Last night, a few of us from the Toronto Tailscale team set sail aboard the Empire Sandy for DevOps by the Docks, hosted by iTmethods alongside CircleCI, Rootly, and Amazon Web Services (AWS) . The drinks were cold, the conversations were warm, and the views? Peak Toronto. 🌇 Huge thanks to the organizers and everyone who came out to chat infra, CI/CD, incident response, and everything in between. Let’s do it again soon.
About us
For teams who want secure, private networks without weeks of setup and configuration, Tailscale makes it easy. Unlike existing corporate VPNs, Tailscale has no upfront cost, minimal latency, and works with their existing services.
- Website
-
https://tailscale.com
External link for Tailscale
- Industry
- Software Development
- Company size
- 51-200 employees
- Headquarters
- Toronto, Ontario
- Type
- Privately Held
- Founded
- 2019
- Specialties
- Security, Privacy, Log Processing, Connectivity, Remote Access, 2FA/MFA, WireGuard, Computer Networking, Computer Networks, WireGuard, VPN, and SASE
Products
Tailscale
Zero Trust Network Access (ZTNA) Software
Tailscale is the platform for secure, identity-first networking, providing private and seamless connectivity for modern applications, teams, and workflows. Designed to simplify complex network architectures, Tailscale replaces traditional models with fast, reliable connections that enhance productivity and security. Trusted by engineering and IT teams globally, Tailscale enables organizations to implement Zero Trust principles effortlessly, connecting devices, applications, and environments across cloud and on-premises infrastructure. Built on WireGuard®, Tailscale delivers a scalable solution that adapts to organizations of any size, ensuring secure access while reducing operational complexity.
Locations
-
Primary
Toronto, Ontario M6K 3S5, CA
-
Berkeley, CA 94705, US
Employees at Tailscale
Updates
-
Our network just got stronger. In the last month, we welcomed Alex Chan, Nicholas Marrone, Saloni D., Megan Walsh, Samuel T. Jinadu, Aditya (Adi) Jahagirdar, and Arthur Lee!
-
-
People don't really leave their AI servers open on the web, right? Cisco researchers found more than 1,100 exposed LLM servers on the public internet, most of them within 10 minutes. The culprits are pretty typical: default configs, weak or missing authentication, lack of network isolation and auditing. Read our post on Cisco's findings, and see how Tailscale helps address these issues:
-
We're #hiring a new Executive Assistant in Canada. Apply today or share this post with your network.
-
We're #hiring a new Backend Engineer, Platform & Identity in United States. Apply today or share this post with your network.
-
We're #hiring a new Backend Engineer, Platform & Identity in Canada. Apply today or share this post with your network.
-
What would you hack together, using Tailscale, in just one week? Tailscale's technical staff fell down some interesting rabbit holes during a week-long hack session this year. Check out the not-entirely-finished results on our blog: https://lnkd.in/gvvKxi7S
-
Read Avery's latest article for TechRadar on the 'death' of the business VPN (Spoiler: It's not dead yet...) 🪦
Zero Trust was supposed to kill the VPN. It didn’t. In fact, the business VPN market is booming — projected to nearly double in size over the next decade. Why? Because real-world networking is messy. Because migrating to Zero Trust is hard. Because security that's technically right often gets in the way of people just trying to do their jobs. I’ve written five different VPNs over 25 years. Not because I like VPNs (I really don’t) but because the alternatives keep turning out worse. In my latest piece for TechRadar, I look at why VPNs are still everywhere, and what it’ll actually take to move forward. Not through buzzwords, but through systems that make security usable. That make sense. Tailscale wasn’t built to reinvent VPNs for the fun of it. We’re here because people still need secure access that works, without friction, without tradeoffs, without trusting the whole network. If we do this right, maybe next time we won’t have to rebuild the same tunnel, again. I'm certainly hoping fifth time's a charm! https://lnkd.in/guBZVJxd