Teleport, the Infrastructure Identity company, is making a major update to its platform to give security teams unprecedented insight into how identities behave as they move across identity provider, code, cloud, and infrastructure environments.
With this release, Teleport Identity Security becomes “the first solution to solve this with full identity chain observability: a real-time view of every step an identity takes as it traverses technology platforms, including authentication, role and privileges, developer code, and infrastructure actions,” according to the company.
Together, these features give security teams the ability to accelerate incident response by spotting and responding to risky activity within minutes.
“Identity is now the leading attack vector, but most cybersecurity products see only a part of the picture,” said Ev Kontsevoy, CEO of Teleport. “Teleport connects the dots, letting security teams detect risky behavior across fragmented systems in real time and accelerate intervention.”
Currently, identities are fragmented across different tools, such as identity providers (including Okta), cloud services (such as AWS), developer platforms (including GitHub), and infrastructure resources (databases, servers, Kubernetes, workloads).
These siloed identity interactions typically get tracked in siloed logs, impeding the ability to answer critical questions like:
- Who accessed this database and through what permissions?
- Is this behavior regular or anomalous for this identity?
- What is the summary of all activity done in this session?
- What accounts still have access to production after an org change?
- Are there unmanaged keys or tokens granting backdoor access?
With identity chain observability, security and infrastructure teams can quickly gain insights without the manual work of correlating logs, accelerate forensic investigation through evaluation of correlated data, and expose and eliminate new identity vulnerabilities that are currently hidden.
Teleport Identity Security is especially relevant for security teams focused on:
- Detecting lateral movement and insider threats
- Accelerating forensic investigations
- Preventing over-privileged access across cloud services
- Meeting compliance standards like SOC 2, NIST, and ISO 42001
Teleport Identity Security new features include:
- Cross-platform identity tracing — Unifies log data across identity providers (e.g., Okta), code (e.g., GitHub), cloud (e.g., AWS), and infrastructure access (e.g., Teleport) and reconstructs identity behavior across this identity chain
- Identity weaknesses detection and investigation — Flags anomalies and accelerates investigation, reducing the time involved in log analysis
These features build upon existing capabilities:
- Access Graph — A real-time visual map showing the relationships between users, machines, roles, and resources, with SQL Editor
- Crown Jewel Monitoring — Tracks access changes to critical systems in real time
- SSH Key and Shadow Access Discovery — Surfaces unmanaged or legacy keys that bypass controls
Teleport’s new Identity Security capabilities are available now with Teleport 18 for on-premises instances, with cloud delivery to follow within one quarter.
Teleport Identity Security is part of the Teleport Infrastructure Identity Platform, modernizing identity, access, and security for human and non-human identities in infrastructure, the company said.
For more information about this news, visit https://goteleport.com.