Reviews from AWS customer

8 AWS reviews

External reviews

46 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Deven Rouse

Secure remote access has simplified my home lab and now routes all my mobile traffic through it

  • May 09, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Tailscale is connecting me to my home lab, which serves as my front-end infrastructure, whereas I use ZeroTier for back-end infrastructure for connecting things such as IOT devices and personal servers.

A specific example of how I use Tailscale with my home lab is that it allows me to easily provide secure access from myself to my home lab while on the go. This does more than just connect me with my servers; it allows me to run all of my internet traffic on my devices while on the go through my router as the exit node, which allows me to use AdGuard as my DNS server and my home firewall. Overall, it makes me more secure on the go and prevents me from often having to use HTTPS on many of my personal services because Tailscale encrypts traffic already, making HTTPS sort of irrelevant in that specific use case.

What is most valuable?

The best features Tailscale offers are its encrypted tunnel and easy setup VPN, which are common across your space. I personally love two specific things that differentiate Tailscale: the automatic HTTPS setup, which means you don't have to deal with certificates or anything similar, and the ability to use exit nodes very easily, which is a super useful feature.

The automatic HTTPS setup and easy node management have helped me in my daily workflow because I have an automation on my iPhone that runs as soon as I disconnect from my home network, allowing me to tunnel my cellular data through Tailscale back to my home lab and run my router as an exit node. This means I can use AdGuard for my DNS to block anything from malware to ads in general. The HTTPS setup is super useful for another use case I had where I was building an AI German teacher for myself, allowing communication to happen because most browsers require HTTPS for such connections. Not having to set up certificates and simply using the Magic DNS URL with HTTPS on the Tailscale side was super time-saving and useful.

Tailscale positively impacts my organization because I can feel incredibly secure on the go without worrying about opening ports on any routers. It makes an incredible amount of sense for my use, and I wish I could use it more in my role at ADP, though they generally manage that externally through Cisco. But I give my sign-off to advertise to them.

What needs improvement?

The only improvement I see for Tailscale is that I would love to check out Headscale to fully host it on my own infrastructure. However, I think it is a really great product as is. It is easy to set up, and since it uses WireGuard on the back end, it is quite fast. I would love to see a diagram that gives me clearer visibility into how I connect to each node, as I often find I connect to non-direct routes to individual servers, and a visual representation of that would make it easier to visualize.

For how long have I used the solution?

I have been using Tailscale for about five years.

What do I think about the stability of the solution?

Tailscale is stable most of the time, as I occasionally see dropouts. However, I appreciate receiving notifications about drops, which I almost never notice myself. Occasionally, I see on my router that the exit node has gone dark, but I don't notice that in practice.

What do I think about the scalability of the solution?

Tailscale's scalability is very good, with the visibility and ability to access metrics making it easy to scale upward, although I have limited experience with that as I have under 100 devices, around 20.

How are customer service and support?

I have never had to use customer support because the product is that good.

Which solution did I use previously and why did I switch?

I previously used ZeroTier for my back-end services, and I think that is the number one one-to-one competitor within your space. I switched from ZeroTier to Tailscale for two reasons: it was much easier to set up Tailscale, and while ZeroTier still has value, Tailscale makes more sense for the speed, visibility, and overall functionality, especially with exit nodes being easier to use.

How was the initial setup?

Tailscale is incredibly easy to use, and I will always sing its praises. It has made my life a lot easier. I was originally an early adopter of ZeroTier and championed that for a long while. Only in the past couple of years have I switched over to Tailscale, and it has been world-changing, making many things easier to achieve the security I was looking for on the go.

What's my experience with pricing, setup cost, and licensing?

I generally work within a free tier, as there is no reason for me to step outside of that currently.

Tailscale has definitely made it so I don't have to incur additional costs. The ability to use your servers as relay servers instead of setting up my own Headscale server is the primary reason I haven't done so far, because it makes things easy and time-saving.

Which other solutions did I evaluate?

Before choosing Tailscale, I evaluated ZeroTier again. The only reason I haven't moved my entire infrastructure to Tailscale is cost. I can utilize free accounts on both Tailscale and ZeroTier, allowing me to build a back-end infrastructure for my family without paying for an entire organization account. ZeroTier operates on a device-based quota, while Tailscale uses an account-based quota.

What other advice do I have?

A specific example of how I use Tailscale with my home lab is that it allows me to easily provide secure access from myself to my home lab on the go. This does more than just connect me with my servers; it allows me to run all of my internet traffic on my devices on the go through my router as the exit node, which allows me to use AdGuard as my DNS server and my home firewall. Overall, it makes me more secure on the go and prevents me from often having to use HTTPS on many of my personal services because Tailscale encrypts traffic already, making HTTPS sort of irrelevant in that specific use case. I would rate this product a 10 out of 10.


    Adeniyi Stephen

Secure access control has simplified global developer connectivity and protected internal services

  • May 04, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Tailscale is to whitelist connections using the exit node to whitelist certain connections to public addresses. I also use it to access internally exposed load balancers and to gatekeep certain services within the VPN.

For accessing internally exposed load balancers or whitelisting connections, we may have a GKE Kubernetes cluster set up with an authorized network, meaning access is restricted to authorized networks and a VPN Gateway IP that can only access it from the public internet. To give a developer access to the internal IP of the control plane without exposing it publicly, we install a Tailscale operator in the cluster. Once the Tailscale operator is installed, we expose the internal IP of the cluster through one of the pod operators as a subnet router. When developers connect their Tailscale client, they can access the cluster locally without routing through the public internet.

Tailscale can also be used for whitelisting. For instance, if we have a service in the Kubernetes cluster exposed externally through Traefik, NGINX Ingress, or a Gateway and certain users need access, we can set up exit nodes for different regions. If we have users in Europe and users in America, we can set up an exit node for users in America and another for users in Europe. These exit nodes have external IPs that we can use as a whitelist in our externally exposed services. When traffic comes from those external IPs, it is allowed through. When a user connects their Tailscale client and enables one of the exit nodes, they can access the externally exposed address since it is whitelisted to those external IPs. If their Tailscale client is not connected and the exit node is not enabled, they cannot access the externally exposed service.

What is most valuable?

The best features Tailscale offers is that the access control list is good. We can separate different kinds of connections even within the tailnet, allowing developers to connect to certain IPs and services, with engineers having different access levels. Tailscale is fast as well.

The access control lists help my team by allowing us to control who accesses our services. For instance, we have some services on developer clouds where only certain users can connect. Those developer clouds are on our VPC, which is exposed with tailnets. Developers must connect to Tailscale to access the tailnet and developer cloud already exposed to the tailnet. We created groups with certain users and administrators who can access government clouds. We only have to give those groups access to those government cloud IPs, while every other developer cannot access the government cloud IP because the ACL controls this.

For speed, we can use the same ACL. If we only expose certain cluster addresses to certain developers, we open the dev cluster's local address to the developers. In some cases, we want to ensure the security team can access the cluster locally to perform audits. We can grant the security team access to the cluster in the ACL. This works very fast. With just the configuration required in the ACL, within a few seconds, we can see the access reflecting for the security team, and they have access.

In terms of how Tailscale has impacted my organization positively, it is good for security on the network side of things. It helps us connect properly. Because our company is remote globally, even if someone is in Australia and needs to connect to a cluster or any services, instead of routing through the public internet and exposing the traffic there, we can connect internally through Tailscale tailnets, and everybody is working.

What needs improvement?

Tailscale can be improved, especially with logging in. I have two tailnets, for instance, one for personal use and one for my company organization. Sometimes trying to log out of a particular tailnet and connecting to the company's Tailscale tailnet is challenging. Especially if you have been logged into one of those tailnets for a long time and want to log into another one after a few days, the login process can be tricky. Sometimes I have to restart my whole system to ensure that after I log out from one tailnet, I can effectively log into another one. The process is not as smooth as I would imagine, especially if it has been a while. We have to log out and sometimes even switch off the entire system and log back in.

I choose eight out of ten because there are other improvements that can be done with the logging. I am not a fan of the ACL in its current format. It is a JSON ACL, and perhaps if it were in YAML format, that would be better and more readable.

Aside from the logging side of things, everything is straightforward with Tailscale. The ACL can be improved by converting it from JSON format to YAML format for better readability.

For how long have I used the solution?

I have been working in my current field for three years. I have been using Tailscale for close to three or four years.

What do I think about the stability of the solution?

Tailscale is stable.

What do I think about the scalability of the solution?

We are using Tailscale at the SaaS level, so we do not scale it locally. We do not install it on premises.

How are customer service and support?

Tailscale's customer support is good and very responsive. I would rate the customer support a ten.

Which solution did I use previously and why did I switch?

Before Tailscale, we used a normal VPN like GCP Cloud VPN, for instance, which was adequate but had limitations.

What was our ROI?

I have seen a return on investment in terms of time saved and security. Time saved and security provide good returns.

What's my experience with pricing, setup cost, and licensing?

I am not involved in the pricing side of things as I am an administrator who controls Tailscale and ensures developers have access. The pricing is mostly handled by the IT and accounting team. Based on what I hear from them, it is a bit costly and can be on the expensive side.

Which other solutions did I evaluate?

We went for Tailscale straight away without considering other alternatives.

What other advice do I have?

The advice I would give to others looking into using Tailscale is that it is good for developers. Tailscale is deployed in our organization on public cloud and Kubernetes clusters. We do not have a hybrid or private cloud setup. We have it mostly on public clouds. The UI of Tailscale looks good and is not problematic. I rate this review eight out of ten overall.


    Athalla Barka Fadhil

Secure access has protected critical servers and now simplifies private SSH and service sharing

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use Tailscale to publish and as an SSH service. I secure my SSH port and then use Tailscale to SSH into my VPS. I also use Tailscale to serve private services on my VPS so my teammates can access them securely without exposing the port publicly.

Our VPS was attacked by a bot targeting our port 22 or SSH service. Our service is quite critical, so exposing it publicly would pose a danger to our services, especially our company's database. That is why I use Tailscale to secure all of our services.

I use Tailscale to secure our CI/CD pipeline as well. We do not use any SSH key anymore; we use Tailscale SSH instead. I can easily connect to a private VPS using Tailscale without needing to be there because Tailscale acts as a VPN.

What is most valuable?

The best features Tailscale offers that benefit me are the SSH services and VPN services, and how it can expose a service without publicly exposing the port or provide access control to which services are available to our teammates or made publicly available. Tailscale Serve and Tailscale SSH are the most useful features in my opinion.

We are able to share only a specific service with our teammates, which is basically a least privilege access. They will not be able to access the database, but they are able to access our monitoring log and other services.

What needs improvement?

The funnel is particularly handy. It is much similar to Cloudflare Tunnel, but it is from Tailscale. I would appreciate the ability for it to funnel many services from our VPS because as far as I know, it can only funnel one thing from our VPS, so one domain only. If you want more domains, you have to use a sidecar container, which is not quite convenient. If I were to request a feature from Tailscale, it would be to have a funnel that allows me to serve multiple services on our VPS.

Another feature I would request is a custom domain. I would like to customize my Tailscale domain other than funnel. Funnel lets you expose multiple services in your server and then you can customize the domain name for each of the services. Currently, I am only given the MagicDNS domain. If I could give Tailscale access to my DNS management, then Tailscale could customize that domain for our funnel services. I think that would be very helpful.

I am currently facing an issue where on my Mac, Tailscale does not allow me to log in to multiple accounts. It is quite hard to switch between accounts. I think that is quite critical and needs to be improved.

The desktop version on macOS does not allow me to switch between multiple accounts easily. It requires me to log in every time I want to switch accounts, and it actually creates another node for my laptop. Even though I have one laptop, it creates multiple nodes every time I switch accounts from A to B and B to A. When I switch back to my original account, it actually creates another node instead of reconnecting to the previously connected node.

For how long have I used the solution?

I have used Tailscale for about one and a half years.

What do I think about the stability of the solution?

Tailscale is very stable and I have not noticed any downtime so far.

What do I think about the scalability of the solution?

Currently, our organization is quite small, so I have not met any limits from Tailscale.

How are customer service and support?

I have not reached out to customer support because I have been able to solve everything myself and from the documentation, so I have not needed to contact customer service.

Which solution did I use previously and why did I switch?

I used fail2ban to block bots from brute-forcing our SSH service, but because it was not effective enough, I switched over to Tailscale.

How was the initial setup?

Installing Tailscale does save time in managing the firewalls because I do not need to know much about firewalls, especially UFW, as I can just install Tailscale and our server connects instantly. This saves a lot of our time.

Tailscale definitely saves me a lot of time securing our server. I do not really need to install fail2ban or CrowdSec or modify our UFW firewall. I can just install Tailscale, close many ports, and then share them with my teammates. It is really time-saving and, of course, money-saving because Tailscale's free tier is very generous.

What about the implementation team?

I have not reached out to customer support because I have been able to solve everything myself and from the documentation, so I have not needed to contact customer service.

What's my experience with pricing, setup cost, and licensing?

Tailscale is very generous with pricing. I have not met the limit at which I need to upgrade my tier, so I am currently on the free tier and I do not think I need to upgrade because the free tier is more than enough and it is very generous.

Which other solutions did I evaluate?

I went directly to Tailscale.

What other advice do I have?

It becomes much easier to share our services with our teammates without needing to handle the firewall directly. For security, it is indeed much safer now because we can close all of our ports and then just share the link to our machine with our teammates so they can access it using Tailscale VPN.

I would recommend trying Tailscale. Use the managed Tailscale service because its free tier is very generous, and then you can avoid modifying the firewall and completely migrate your entire infrastructure to using Tailscale VPN. I would rate this experience a 9 out of 10.


    Filipovikj Filipovich

Secure access to home servers has transformed how I work with local models and client projects

  • April 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Tailscale is the accessibility and simplicity that it offers me to access my servers from anywhere, as well as my local computer and local LLM models. I can access them from anywhere on the network. When I'm doing testing, developing, or handling sensitive data that I don't want to be in the cloud, I can always access my home setup and process the data as required. Additionally, when I was setting up my Kubernetes cluster, I considered Tailscale as a solution for the interconnectivity between the bare metal node and the Oracle virtual machines that I have, which are isolated.

Tailscale helps with accessing my local models and sensitive data due to the simplicity of setting up everything. Even for non-technical people, it's easier to set up. I have my setup with my phone, my laptop, and my servers connected. When I need to work with a client or as a consultant, if they are remote and don't have the technical capabilities to access their infrastructure network, it is as simple as that. I just send them a script showing how to install and what to click to join my Tailscale organization. Then I have access to their system easily.

Tailscale has made things easier for presenting, setting up, and sharing files. When I'm working on a project or building an application in React and want to present the UI, even though it's locally hosted, I can serve it on Tailscale and share the Tailscale link that is accessible from the public so the client can see the work in progress. It has also been useful to use the serve feature for sharing files. If I need to share a specific larger file, I would put it on a share and send the link to a friend or coworker so they can download the file. When the process is finished, I can simply stop the sharing.

What is most valuable?

My opinion about the best features Tailscale offers includes accessibility, simplicity, the file serve feature, and the ability to share internal routes. I can set up access to anything at home. Tailscale will advertise the routes inside the network so you can reach any part of the network without any issues, and it provides the control to isolate everything. I also see they have a new feature called lockout that I want to try.

Tailscale has positively impacted my organization with shorter time for setting up connections and improved accessibility. Even when a non-technical person needs help, I can assist them much faster than explaining the process to them.

What needs improvement?

I don't have any particular ideas or additions about the features. It was nice for the service discovery that I used in the cluster because you can connect and use auto service discovery, but I haven't implemented that much because the complexity of the networking that I have sometimes caused issues.

I haven't thought much about how Tailscale can be improved.

For how long have I used the solution?

I have been using Tailscale for something more than two years.

What do I think about the stability of the solution?

In my experience, Tailscale is stable.

What do I think about the scalability of the solution?

Tailscale's scalability is great.

How are customer service and support?

I find Tailscale's customer support to be good.

Which solution did I use previously and why did I switch?

I did not previously use a different solution.

What was our ROI?

I cannot provide input on whether I have seen a return on investment with Tailscale since I used the free version.

What's my experience with pricing, setup cost, and licensing?

I'm using the free version of Tailscale, so I didn't have any experience with the pricing.

Which other solutions did I evaluate?

Before choosing Tailscale, I evaluated other options by looking at Teleport but for a different solution. For networking mainly, I use WireGuard tunnels, which are peer-to-peer connection point-to-point.

What other advice do I have?

My advice to others looking into using Tailscale is to try it. It's simple to set up and simple to connect your applications from anywhere. I would rate this product an 8 out of 10.


    Naji Ashari

Private branches and remote devices have become accessible and stay connected for daily operations

  • April 29, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use Tailscale to share the branches in one network to make a site-to-site VPN. I have customers, and each customer has a server with too many branches. We need to access some devices that are not connected directly to the network, such as fingerprints that cannot have any firmware to install, for example, Tailscale agents. I need to connect the branch with the headquarter office and use Tailscale commands to reach the fingerprint through this VPN site-to-site.

This is the main purpose for using Tailscale until now, and I am searching for the other properties and features of Tailscale.

What is most valuable?

Tailscale is fast and easy to install. I can install Tailscale on any operating system, as it has a lot of OS versions and supports Linux, Mac, Android phones, Apple iOS, and Windows. This feature is suitable for my daily jobs and tasks.

Tailscale has a great interface that is friendly and acceptable. Tailscale fixed the problem with reaching devices such as fingerprints, and it is now the most preferred way to connect the site-to-site VPN when we have a customer with fingerprints.

Tailscale is good in troubleshooting, and it takes no time.

What needs improvement?

One of the most significant issues I faced is that in some countries, when I access my Tailscale account, it gives me more steps to verify and confirm, such as sending a message to my mobile and entering the code. I can see this is not helpful for the user experience compared to other alternatives.

Another issue is that when I use Tailscale with other alternatives such as Radmin and ZeroTier, it takes high priority and takes all the incoming connections, even if the other alternative has a different IP scope. It still takes the control and tends to cancel the other software as a VPN site-to-site.

Tailscale is stable, but sometimes with no more use, it sometimes needs to be activated again and again. For example, if I cannot connect or if the customer cannot connect to the network or use the tool, after one month, the customer gets lost or disconnected from the network and needs to verify again.

For how long have I used the solution?

About one year.

What do I think about the stability of the solution?

Tailscale is stable, but sometimes with no more use, it sometimes needs to be activated again and again. For example, if I cannot connect or if the customer cannot connect to the network or use the tool, after one month, the customer gets lost or disconnected from the network and needs to verify again.

What do I think about the scalability of the solution?

Tailscale is good, and I can add any number of branches I need until now.

How are customer service and support?

Tailscale customer support is good. I can contact them and receive a fast response.

Which solution did I use previously and why did I switch?

I still use other tools such as Radmin and ZeroTier. In previous years, I used to use Hamachi. They were good, but in some cases and some OS that does not support them, I switched to Tailscale.

What was our ROI?

Tailscale is a great solution that is fast, easy, and cheap.

What's my experience with pricing, setup cost, and licensing?

Tailscale is cheap regarding other alternative site-to-site VPN solutions.

Which other solutions did I evaluate?

I evaluated Radmin and ZeroTier, and they were good.

What other advice do I have?

Tailscale is good in performance, but with the previous issues I explained, I can give it just eight until it fixes these issues. I give Tailscale a rating of eight out of ten.


    Ismael Junior Coulibaly

Secure remote access has protected data in transit and reduces security incidents across devices

  • April 23, 2026
  • Review provided by PeerSpot

What is our primary use case?

I use Tailscale for secure connections in my enterprise by installing an agent on each device, and I use my PCs as an exit node, so all the traffic goes through my laptop and no one else can access the data in transition.

I also use Tailscale at home, so all the data remains encrypted.

What is most valuable?

The best features Tailscale offers are the ease of use and the security it provides for data in transition.

Compared to WireGuard, Tailscale is easier than other tools because the configuration is straightforward, the installation is simple, the setup is uncomplicated, and adding and removing a user is intuitive. Everything is easy with Tailscale, and you don't have to know much about ACLs or similar concepts.

The user interface is very friendly, and the mobile app is very easy to use.

All communication is more secured with Tailscale. As an IT professional with experience in security, I can confirm that there is a level of protection for our data in transition because the data remains encrypted. We can connect to public Wi-Fi without any concern since Tailscale provides encryption for all devices.

I have noticed fewer security incidents since using Tailscale.

What needs improvement?

As long as Tailscale is still updating the tools, everything is working properly currently, so I don't know what they could improve.

In the future, it would be great if Tailscale could add the exit node feature to the mobile app so that you can use exit node mode on your smartphone.

For how long have I used the solution?

I have been using Tailscale for one year now.

What do I think about the stability of the solution?

Tailscale is stable.

What do I think about the scalability of the solution?

Tailscale is scalable.

How are customer service and support?

I rate the customer support for Tailscale an eight out of ten.

Which solution did I use previously and why did I switch?

Previously, I tried to use WireGuard, but I decided to change to Tailscale because the configuration was quite complex. I chose Tailscale because the installation and configuration were easier.

How was the initial setup?

Pricing, setup costs, and licensing for Tailscale were all affordable, and Tailscale is not that expensive.

What was our ROI?

I have seen a return on investment with Tailscale, and we saved money because we have fewer security incidents. Tailscale has reduced security incidents by thirty percent.

What's my experience with pricing, setup cost, and licensing?

Pricing, setup costs, and licensing for Tailscale were all affordable, and Tailscale is not that expensive.

Which other solutions did I evaluate?

I did not evaluate other options before choosing Tailscale because it relies on WireGuard, which is the more secured VPN.

What other advice do I have?

I rate this product a nine out of ten.


    Yaron K.

Super Easy Private Network for Secure Server Access

  • April 21, 2026
  • Review provided by G2

What do you like best about the product?
Super easy way to create a private network between my laptop and my servers so that only I can access them.
What do you dislike about the product?
Nothing, it works great and does the job.
What problems is the product solving and how is that benefiting you?
I want to keep my servers secure by allowing only my laptop to SSH into them. Tailscale creates a private network that gives me exactly that level of access control.


    Dakoh Darko

Secure connectivity has supported GDPR-compliant CI deployments across private internal systems

  • April 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Tailscale is connecting to company internal systems due to GDPR requirements. The company is located in Germany with private servers in Germany, and I stay in the UK, so I use it to connect a point-to-site VPN connection from my home laptop to the private servers in Germany. I use Tailscale to create a secure connection.

Apart from connecting to the internal systems, my main use case also provides a very nice interface with the CI pipeline. I connect Tailscale with my CI on GitHub Actions to allow me to do automatic deployments through the company's internal systems.

What is most valuable?

The best features Tailscale offers are really easy usability and a straightforward user experience. It is a one-click install where you select your servers that you want to connect to. The whole integration with GitHub Actions for CI is pretty good, and I use it a lot, so I am very confident in that.

The GitHub Actions integration stands out for me because it is not every day you see a seamless tool that can allow you to perform CI builds on private networks. I and the company have tried other options, and it was difficult, but Tailscale provided their action script, documentation, and simple authentication mechanisms using OIDC on GitHub Actions. Everything was straightforward to set up.

Tailscale has positively impacted my organization by allowing us to speed up development without worrying about GDPR restrictions. One of the things about GDPR restrictions is that we cannot allow data to leave the EU region or Germany. It was very easy for us to integrate GitHub with the whole CI pipeline, and it was a very positive impact. It allowed us to eliminate the stress for our CI and the stress of accessing internal systems from far away. So, it allowed us to focus on the development of the application part rather than struggling with how we are going to get this code deployed on certain servers while still following GDPR restrictions.

What needs improvement?

Tailscale could be improved in different ways. I have not really found any problem with it so far. It pretty much solved the problems of other VPN clients that we have been trying. If Tailscale provided a way to integrate with native cloud providers, such as AWS or other cloud platforms, it could be a very nice thing. For example, I want to connect my EC2 instance from AWS over my private Tailscale network. It could be a nice feature so I do not have to stress about the AWS VPC and all that. I could probably just port it over to my Tailscale network. I do not think they have a feature like that, but that would be fine.

I rate Tailscale an eight because I do not think it has any native cloud support with AWS tools such as EC2, GCP, and Azure. If they can find a way to do that, then it would be fine. One of the things that would actually make more sense is if Tailscale could find a way for us to use serverless compute over private networks. Private server functions or serverless functions probably would not be executed on non-EU regions. That is something I am thinking about.

For how long have I used the solution?

I have been working in my current field professionally for four or five years.

What do I think about the stability of the solution?

Tailscale is stable.

What do I think about the scalability of the solution?

Tailscale's scalability is good. It is scalable in the sense that we could add as many servers as we want to the network without any downtime from Tailscale. It is pretty fast. Even though I am making a request to the network, the extra hops are pretty much invaluable for network speed. I still get the best speed as possible even though the amount of network hops is two or three. I have to first make a connection to the Tailscale network and then from the Tailscale network to the actual underlying server. Apart from all of that, it is still pretty good. I would say it is really scalable, and I do not think I have ever experienced any downtime with Tailscale.

How are customer service and support?

I have not really had any issues with customer support. I have not really contacted them. If the application is as fine as this, then the customer support should also be good.

Which solution did I use previously and why did I switch?

Before I joined the company, there were several solutions being employed. The company used Teleport and there were a lot of VPN alternatives. There was Twingate and Teleport. We used Teleport before. When I joined the company, we brainstormed together, and I think that was one of the first tasks we did. We found a suitable solution that could handle all this easily, and Tailscale was the one that we picked. We figured out that it was very good.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is that pricing was relatively fine. It had a generous free tier, and the pricing was okay. It is good for the amount of servers that we have. Setup cost was not much; it basically was zero setup cost. We probably just did it ourselves. The software was straightforward. We only had to pay for the amount of servers that were going to be able to enter the network. The company handled the licensing, I am not entirely sure about all the details.

Which other solutions did I evaluate?

We evaluated other options before deciding on Tailscale. We tried Twingate, and I do not remember what all the others were that they were using before. There was this NordVPN client that we could use to connect our servers together, but it was not really developer-friendly. There was Zscaler; we tried to use Zscaler, but it did not really get into what we wanted. They were all good options, but it was not what we wanted. We wanted developer-friendly documentation, access to the CI pipeline build, point-to-site VPN connections, and one-click install. I just install Tailscale, connect the servers, and that is all. I do not want to always be starting up the VPN client and finding my servers and trying to make that connection to them. In my system, I am always automatically connected to that network. Tailscale just provided everything that we needed.

What other advice do I have?

My advice to others looking into using Tailscale is to definitely try it out because it is going to really abstract away a lot of network problems, especially when it comes to private networks, private systems, or internal systems in general. It is really going to abstract away a lot of the complexities. I rate this product an eight overall.


    Pablo Nistal

Secure private access across remote teams has simplified network management and collaboration

  • April 08, 2026
  • Review from a verified AWS customer

What is our primary use case?

Tailscale provides us with the opportunity to have a work network. Since we are teleworking, we need to be able to have an internal data center without having to expose it externally to the Internet.

What is most valuable?

Tailscale's simplicity stands out as a key advantage. Our department has several profiles including developers, system architects, and CTOs, which allows us all to work on our own machines. We have a wide variety of people who work with Windows and Linux operating systems, and we can connect to our private network from a terminal. These services are hosted on a data center server and are connected in Docker. Tailscale's wide variety allows us to deploy the services both in Kubernetes clusters and directly on Linux server hosts, as well as in Docker containers, which lets us have a shared resource network without having to create complicated network routing rules. It even allows us to have our own DNS to redirect addresses that we select.

The great ease of being able to interconnect people who might not have a technical profile stands out as an advantage my team gets from using Tailscale for this type of integration and resource management. In the past, we used OpenVPN or Fortinet services, and with just a small installer, it is very easy and simple for employees to use the connection.

The best features that Tailscale offers are ease of use, ease of connection, and a fairly generous connection plan. It allows us to apply ACL policies, which is very beneficial. We do not need to add something extra to define access permissions per user, and that is vital at an organizational level. The console allows you to connect, and there is another interesting feature where you can invite users from other Tailscale networks, which is quite useful.

The ACL is very easy to understand and not as complex as older WireGuard systems. We can create IP ranges or define what kind of people or users can access which resources, which gives us a great deal of peace of mind about our infrastructure.

The most positive impact Tailscale has had on my organization is significant. While working with different providers such as AWS, Azure, or even on-premise, we found that having a single solution to interconnect all those different types of architectures was a complete challenge. Each provider gives its own VPN option, but it is not a scalable, standard, or universal solution. We started using WireGuard to conduct studies of this type, but maintenance became costly, and we always depended on having at least one exposed node to handle the routing or network rules. With Tailscale, the picture changed completely because it allows us, in a simple and native way, to install this type of service, even bypassing complex configurations. We have had situations where we have connection points through CGNAT with 3G routers, and Tailscale provides a solution that is quick, simple, and with very effective speeds, which has pleasantly surprised us.

What needs improvement?

I am currently testing the ability to expose to the WAN certain services that we select, which is in beta. I imagine it is still in development, but from the tests we have done, the connection outward is quite slow, which is a point of curiosity, and I hope that aspect can be improved.

At a basic level, Tailscale could improve the interface to enhance the user experience. Another potential improvement would be to provide Internet exit nodes that are faster. I understand that Tailscale is not a CDN as such, but they could try to achieve some technique that at least provides connections of ten megabytes per second, for example.

Tailscale uses certain flags, such as accepting routes or accepting DNS when logging in, which could be improved. For people who are technical, it is not a problem, but for those who are not as technical, providing this information or presenting it to the user in a simpler way so they understand what they are enabling or disabling could be beneficial.

For how long have I used the solution?

I have been working with Tailscale for about four years personally for my personal platform, and then I have been using it professionally for around two years.

What do I think about the stability of the solution?

I consider Tailscale to be a stable solution. There are other services that I am curious to use because I do not know how they work, but for what we use it for—interconnection and networks—it is very stable.

What do I think about the scalability of the solution?

My experience with Tailscale's scalability is optimal and very good. It is incredible that it can be connected on so many platforms, such as Docker, clouds, and operating systems.

Which solution did I use previously and why did I switch?

Before Tailscale, we used OpenVPN, then WireGuard, and we also used Fortinet. Tailscale encompasses a very good balance for maintaining our own infrastructure.

How was the initial setup?

I have been one of the people who, professionally when I worked at another company, proposed this solution. It seems too novel at first, and it appears that it may not be reliable. Fortunately, at the company I am currently at, they understand the essence of this product or service, which really allows us to save enormous amounts of time in onboarding users, configurations, and removing access quickly and safely. That is the main thing because when we looked at other solutions such as ZeroTier or WireGuard itself, they did not guarantee automatic refresh. With Tailscale, we do see that even the admin panel is very simple, even for non-technical people. It has reduced the complexity of onboarding and implementation by approximately sixty to seventy percent in time, for certain.

What was our ROI?

I have noticed a return on investment from using Tailscale, particularly in time. It has been something around sixty to seventy percent much less time. As for costs, even though I do not handle them, I understand that this reduces costs first because of the time that is spent, and second, in terms of infrastructure requirements, which are minimal. Previously, networks with FortiGate were used, and that forced us to spend on hardware. With Tailscale, that type of investment is not necessary.

Which other solutions did I evaluate?

Before choosing Tailscale, I evaluated other options, and there are many Tailscale forks, but we went directly with this solution because it is the Enterprise version.

What other advice do I have?

Tailscale offers a solution that is already mature, proven and tested, and secure, where you can save costs and maintain a small, medium, or even large infrastructure. I would really appreciate the possibility that Tailnets, instead of giving a random name, would allow us to choose a name and type it. I can rename a Tailnet that it offers directly, but it does not let us write our own, and it would be beneficial if at some point this could be done. I would rate this product and service highly.


    rokawoo.com

Secure network access has simplified real-device testing across mobile and desktop platforms

  • April 03, 2026
  • Review from a verified AWS customer

What is our primary use case?

For Tailscale, we use it in testing in terms of mobile deployment, and it is a great way to connect a mobile device or any device to a network to allow us to get onto our testing networks and see the UI and other things in that regard on different devices very easily.

Tailscale is very intuitive as well as accessible, which allowed us to connect everything to our testing network very seamlessly since it could easily be downloaded onto mobile devices or other devices.

That covers our main use case and what Tailscale does a great job at helping with our testing and device connectivity.

For the platform that we used Tailscale for, we really just set up accounts and were given access through being invited to a Tailscale team, from which we could just set up connectivity on the device.

What is most valuable?

The best features Tailscale offers in my experience would be accessibility from any device; it is on iOS, it is on Android, and it helps us test multiple environments very well, especially for UI testing to ensure all of our UIs are reactive on all devices correctly across our entire infrastructure and device network.

The ease of connectivity in terms of Tailscale's ability to allow downloading the application on any device, whether it be a laptop or mobile, stands out as the most valuable for our workflow, because it allows them to communicate very seamlessly and easily with minimal setup, which was its biggest appeal to our team in developing our platform.

In terms of testing, Tailscale was the best way for us to establish connections across multiple devices and allowed us to test our UI and application across different platforms, iOS, Android, seamlessly, which made our website more reactive and essentially drove our testing.

What needs improvement?

I would not say anything in Tailscale's use case could be improved; what it does and its intended use is perfect, but the application on the laptop is a little buggy since it continuously opens in the background when it should not be.

For how long have I used the solution?

I have been using Tailscale for about two years.

What do I think about the stability of the solution?

Tailscale has been stable in my experience as I have never had problems with connectivity or any bugs in its usage.

What do I think about the scalability of the solution?

I cannot comment too much on scalability since our team always remains very small in developing our platform, but for the team members that we have added to it, there have been no problems, so it has handled everything very well.

How are customer service and support?

I have never needed customer support for Tailscale.

Which solution did I use previously and why did I switch?

We did not use a previous solution; Tailscale was the first thing that came up when we needed to solve our issue of getting onto multiple devices very easily.

How was the initial setup?

I did not handle any pricing, setup costs, or licensing for Tailscale, but from what I know, it was very affordable at only five dollars per month for a team of Tailscale users, which is really easy for small startups.

What about the implementation team?

We went straight for Tailscale without evaluating other options, as it was just perfect for our use case and needs.

What was our ROI?

I have seen time saved as a significant return on investment since it was a big help over dealing with emulators, as Tailscale allowed our application to run directly on our device and see our reactiveness.

What's my experience with pricing, setup cost, and licensing?

I did not handle any pricing, setup costs, or licensing for Tailscale, but from what I know, it was very affordable at only five dollars per month for a team of Tailscale users, which is really easy for small startups.

Which other solutions did I evaluate?

We went straight for Tailscale without evaluating other options, as it was just perfect for our use case and needs.

What other advice do I have?

If you are looking for a one-stop shop application that handles device connectivity across platforms, whether it be PC, Android, or iOS, Tailscale is a great solution for connecting devices together to get onto the same network for easily testing your applications on actual hardware rather than emulated hardware. I give this product a rating of nine out of ten.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)