Say goodbye to your legacy VPNMake the switch to Tailscale
Get started
Login
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2024 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.

Bring Tailscale to Work

Trusted by 9,000+ companies

Get started with Tailscale for your team

Fill out this brief form and we'll get in touch with next steps. And, as a little thank-you for introducing us to your team, we’ll upgrade your Personal plan to Personal Plus—free for an entire year.

For adding the Personal Plus plan

Tailscale needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Rolling out Tailscale for your team

Rolling out a new networking solution for your company shouldn’t be a daunting and cumbersome task. Here’s how you can plan your rollout to ensure a cost-effective and seamless adoption of Tailscale to improve your team’s security and performance.

An icon of a command line interface window

Identify the most critical requirements including number of users, levels of access, types of devices and operating systems that need to connect.

A stylized wrench icon

Conduct a trial with a small group to help network admins understand its functionality, identify potential issues, and prepare your team for the update.

Two arrows passing downwards through a circle then diverging left and right

Tailscale’s access control lists (ACLs) rules can define which users, groups, hosts, and devices can connect to each other. It’s important to define your ACLs up front to ensure granular control.

A stylized padlock icon

Program your ACLs to determine which users, roles, or groups can access each resource on your network.

A stylized silhouette of a person next to a checkmark

Use SSO & MFA from a wide array of supported IdPs to authenticate users onto your Tailscale network.

A horizontal line with one upward peak and one downward peak

Use this drop-in replacement to manage & record shell access into any linux machine without needing to share or manage keys.

Read our complete guide to rolling out Tailscale in your company. Fill out the form above, and we’ll reach out to help, or join our monthly office hours with Tailscale Solutions Engineers for live support and answers.

Learn more about how companies use Tailscale

In this webinar, we explore why many personal users choose to bring Tailscale to work and highlight the various ways companies use our services.