{"id":25169,"date":"2022-12-21T23:26:28","date_gmt":"2022-12-21T23:26:28","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/"},"modified":"2022-12-21T23:26:28","modified_gmt":"2022-12-21T23:26:28","slug":"teleport-takes-identity-based-data-security-to-the-next-level-with-code","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/","title":{"rendered":"Teleport takes identity-based data security to the next level with code"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2022\/12\/IMG_4441.jpeg\" \/><\/p>\n<div>\n<p>As infrastructure as a service opened the doors for infrastructure as code, developer teams started to use programmatic APIs to spawn new resources quickly, and on demand. Boosted by scalability and automation, the IaC approach strengthened DevOps teams, but the rapidity of application iterations ofent left security teams justifiably concerned.<\/p>\n<p>The solution: applying the IaC mindset to data protection, crafting a method to support security and policy as code. Now DevSecOps teams can automate tasks such as pen testing, curbing infamous delays in production time.<\/p>\n<p><span style=\"font-weight: 400;\">\u201cIf you want to have a set of rules that govern who or what and when, and under what circumstances can access what data\u2026 wouldn\u2019t it be nice to use code for it? Teleport does [that] with policy.\u201d said <\/span><a href=\"https:\/\/www.linkedin.com\/in\/kontsevoy\/\"><span style=\"font-weight: 400;\">Ev Kontsevoy<\/span><\/a><span style=\"font-weight: 400;\"> (pictured), co-founder and chief executive officer of Teleport (Gravitational Inc.) \u201cSo essentially, if you want security as code, that\u2019s what Teleport provides.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kontsevoy spoke with theCUBE industry analyst <\/span><span style=\"font-weight: 400;\">Savannah Peterson<\/span><span style=\"font-weight: 400;\">\u00a0and John Furrier<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">at AWS re:Invent, during an exclusive broadcast on theCUBE, SiliconANGLE Media\u2019s livestreaming studio. They discussed identity-native and security-as-code trends.\u00a0<em>(* Disclosure below.)<\/em><\/span><\/p>\n<p>The following has been edited for clarity.<\/p>\n<p><b>Peterson: Teleport is about identity, right? Give us a little bit of a pitch.\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Kontsevoy: Teleport is the first identity-native infrastructure access platform. It\u2019s used by engineers and by machines. First, identity-native. What does it mean? Identity-native consists of three things. The first component of identity-native access is moving away from secrets toward true identity. By secrets, I mean things like passwords, private keys, browser cookies, session tokens, and API keys. All of these things are secrets, and they make you vulnerable\u2026 We use something called True Identity; it\u2019s a combination of your biometrics as well as the identity of your machines. That\u2019s [trusted platform modules, hardware security modules, YubiKeys], etc.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second component is zero trust. Teleport is built to not trust the network. So every resource inside your data center automatically gets configured as if there is no perimeter. It\u2019s as safe as it was on the public network. And the third one is that we keep the access policy in one place. So, Kubernetes clusters, databases, [remote desktop and all of these protocols], the access policy will be in one place.<\/span><\/p>\n<p><b>Peterson: How much more secure is leveraging biometric data for identity than the secrets we\u2019ve been using historically?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The fact is that I don\u2019t see how your credentials will be stolen in this system simply because your TPM on your laptop and your fingerprint cannot be downloaded. A lot of people ask us a slightly different question; it\u2019s almost the opposite of it. Like how can I trust you with my biometrics? When I use my fingerprint, that\u2019s my information; I don\u2019t want my company to get my fingerprint.\u00a0<\/span><span style=\"font-weight: 400;\">The answer to that question is, your fingerprint doesn\u2019t leave your laptop. Teleport doesn\u2019t see your fingerprint.\u00a0<\/span><\/p>\n<p><b>Furrier: What are your conversations with customers at re:Invent? Because this is a much broader conversation on the architectural refracturing of organizations.\u00a0<\/b><\/p>\n<p><span class=\"transcript-item inside-selection\" data-index=\"419\"><span style=\"font-weight: 400;\">Kontsevoy:\u00a0<\/span>I will mention two trends I observed.<\/span><span data-index=\"419\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"420\">The first one is not even security related.<\/span><span data-index=\"420\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"421\">It\u2019s basically how, as the cloud becomes more mature,<\/span><span data-index=\"421\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"422\">organizations<\/span><span data-index=\"422\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"423\">develop their own internal ways of doing cloud properly.<\/span><span data-index=\"423\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"424\">And they\u2019re not the same.<\/span><span data-index=\"424\">\u00a0F<\/span><span class=\"transcript-item inside-selection summary\" data-index=\"431\">or example,<\/span><span class=\"transcript-item inside-selection summary\" data-index=\"432\">\u00a0some companies love having,<\/span><span data-index=\"432\">\u00a0<\/span><span class=\"transcript-item inside-selection summary\" data-index=\"433\">ideally, just one enormous Kubernetes cluster<\/span><span data-index=\"433\">\u00a0<\/span><span class=\"transcript-item inside-selection summary\" data-index=\"434\">with a bunch of applications on it.<\/span><span data-index=\"434\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"435\">And other companies create Kubernetes clusters<\/span><span data-index=\"435\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"436\">for different workloads. B<\/span><span class=\"transcript-item inside-selection\" data-index=\"437\">oth believe that they\u2019re doing it properly.<\/span><span data-index=\"437\">\u00a0<\/span><\/p>\n<p><span class=\"transcript-item inside-selection\" data-index=\"441\">The second trend <em>is<\/em> security related.<\/span><span data-index=\"441\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"442\">Every organization is struggling with the access silos,<\/span><span class=\"transcript-item inside-selection\" data-index=\"443\">\u00a0dreaming about a day<\/span><span data-index=\"443\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"444\">where they have one place,<\/span><span data-index=\"444\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"445\">with great user experience,<\/span><span data-index=\"445\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"446\">that simply spells out, \u2018this is what policy is<\/span><span data-index=\"446\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"447\">to access this particular data,\u2019<\/span><span data-index=\"447\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"448\">and it gets automatically enforced.<\/span><span data-index=\"448\">\u00a0B<\/span><span class=\"transcript-item inside-selection\" data-index=\"449\">ut every single cloud provider,<\/span><span data-index=\"449\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"450\">but every single application, but every single protocol,<\/span><span data-index=\"450\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"451\">but every single resource \u2014<\/span><span class=\"transcript-item inside-selection\" data-index=\"452\">\u00a0we don\u2019t have that unfortunately.<\/span><span data-index=\"452\">\u00a0<\/span><span class=\"transcript-item inside-selection\" data-index=\"453\">Teleport is slowly becoming that.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s the complete video interview, part of SiliconANGLE\u2019s and theCUBE\u2019s coverage of <\/span><a href=\"https:\/\/www.thecube.net\/events\/aws\/reinvent-2022\"><span style=\"font-weight: 400;\">AWS re:Invent<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"Ev Kontsevoy, Teleport | AWS re:Invent 2022\" width=\"720\" height=\"405\" data-lazy=\"true\" data-src=\"https:\/\/www.youtube.com\/embed\/PvD3H8vEcR8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p><i><span style=\"font-weight: 400;\">(* Disclosure: <\/span><\/i><i><span style=\"font-weight: 400;\">Teleport (Gravitational Inc.)<\/span><\/i><i><span style=\"font-weight: 400;\"> sponsored this segment of theCUBE. Neither Teleport nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)<\/span><\/i><\/p>\n<h5><span style=\"font-weight: 400;\">Photo: SiliconANGLE<\/span><\/h5>\n<div class=\"silic-after-content\" id=\"silic-1832192329\">\n<hr style=\"border: 1px solid; color: #d8d8d8; height: 0px; margin-top: 20px;\"\/>\n<h3><span style=\"font-size: 16px;\">Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.<\/span><\/h3>\n<\/div><\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/siliconangle.com\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-using-code-reinvent22\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As infrastructure as a service opened the doors for infrastructure as code, developer teams started to use programmatic APIs to spawn new resources quickly, and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":25170,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-25169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Teleport takes identity-based data security to the next level with code - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Teleport takes identity-based data security to the next level with code - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-21T23:26:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/IMG_4441.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1065\" \/>\n\t<meta property=\"og:image:height\" content=\"710\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"Teleport takes identity-based data security to the next level with code\",\"datePublished\":\"2022-12-21T23:26:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/\"},\"wordCount\":787,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/IMG_4441.jpeg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/\",\"name\":\"Teleport takes identity-based data security to the next level with code - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/IMG_4441.jpeg\",\"datePublished\":\"2022-12-21T23:26:28+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/IMG_4441.jpeg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/IMG_4441.jpeg\",\"width\":1065,\"height\":710},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2022\\\/12\\\/21\\\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Teleport takes identity-based data security to the next level with code\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Teleport takes identity-based data security to the next level with code - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/","og_locale":"en_US","og_type":"article","og_title":"Teleport takes identity-based data security to the next level with code - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2022-12-21T23:26:28+00:00","og_image":[{"width":1065,"height":710,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/IMG_4441.jpeg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"Teleport takes identity-based data security to the next level with code","datePublished":"2022-12-21T23:26:28+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/"},"wordCount":787,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/IMG_4441.jpeg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/","url":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/","name":"Teleport takes identity-based data security to the next level with code - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/IMG_4441.jpeg","datePublished":"2022-12-21T23:26:28+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/IMG_4441.jpeg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/12\/IMG_4441.jpeg","width":1065,"height":710},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2022\/12\/21\/teleport-takes-identity-based-data-security-to-the-next-level-with-code\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"Teleport takes identity-based data security to the next level with code"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/25169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=25169"}],"version-history":[{"count":0,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/25169\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/25170"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=25169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=25169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=25169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}