Without needing a VPN server, Enclave builds one-to-one connections that cloak applications with invisible network access gates which only materialise when certain trust standards are met, protecting against discovery, targeting and attack. Forget about configuring firewalls, VPNs, managing IPs, subnets, ACLs, NSGs, VPCs, NAT, routing, VLANs, certificates & secret keys, subnets, VPNs and ACLs — Enclave just works.
Based on our record, Enclave.io should be more popular than WireGuard. It has been mentiond 16 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Full disclosure: I work for one of the companies building such tooling (enclave.io). So while this is a bit of a shameless plug for https://enclave.io, as an architecture and technology it's a a perfect fit to mature your beyond OpenVPN while maintaining feature parity like network level access, MFA and AAD integration. Source: almost 2 years ago
There's a lot of marketing noise in the VPN replacement and ZTNA space atm. We (https://enclave.io) have made a small microsite to try and help shine a light on the different architectures, vendors and options available, let us know if it's helpful. Source: about 2 years ago
This comment is also a bit of a plug for https://enclave.io (sorry!) but getting easy, private access to internal systems on AWS is a perfect fit, especially as a start-up. Enclave is one of several new tools that build a different kind of tunnel - an overlay network directly between hosts, not the traditional hub and spoke VPNs (like OpenVPN). Source: over 2 years ago
If you're looking for a list of ZTNA vendors, we (https://enclave.io) put a vendor directory together based on architecture rather than marketing https://zerotrustnetworkaccess.info/ which you mind find useful. Source: over 2 years ago
Damn it, great spot - thank you https://enclave.io * (that's pretty funny :p). Source: over 2 years ago
Wireguard. Wireguard uses UDP only and runs TCP sockets over UDP. Source: about 2 years ago
Look at Wireguard. I know you don't want Yet Another VPN running alongside your IPSec, but it's less VPN and more encrypted point-to-point UDP. You can set it up on any port you wish, including common ports that might be open on an outbound smart firewall not doing deep packet inspection. That way, it can stay out of the way of your existing IPSec deployment. Source: about 2 years ago
We use Elixir/Erlang for our control plane, and Rust for our data plane, built on the excellent WireGuard® tunneling protocol. Source: about 2 years ago
Both products are based off Wireguard which is available for all new linux distributions. https://wireguard.com . I'm not saying OP's solution is wrong, just curious what the advantages are. Other than potentially simpler client setup, what are the advantages of paying for tailscale. With the opensource tailscale, I'm not sure if you get access to an api you can use to look up the hosts. Source: about 2 years ago
Noise Protocol Framework (used by Wireguard). Source: about 2 years ago
TailScale - Private networks made easy Connect all your devices using WireGuard, without the hassle. Tailscale makes it as easy as installing an app and signing in.
OpenVPN - OpenVPN - The Open Source VPN
ZeroTier - Extremely simple P2P Encrypted VPN
ProtonVPN - ProtonVPN is a security focused FREE VPN service, developed by CERN and MIT scientists. Use the web anonymously, unblock websites & encrypt your connection.
Zent.pro - We help big players unlock crypto’s full potential with confidence. Sophisticated analytics, easy portfolio monitoring, and seamless switching bet ween exchanges are keys to achieving more in any market conditions.
Hamachi - Hamachi is a VPN service scaled to the unique needs of business owners.