Skip to content

Welcome

Welcome! Enclave is a modern, software-defined mesh network designed to simplify the connection of users, workloads, and systems without requiring open firewall ports, changes to network infrastructure, or "edge" devices like Virtual Private Network (VPN) servers.

Getting Started Guide →

What is Enclave?

It's like a VPN, but without the VPN server.

Unlike traditional VPNs that route all traffic through a central server, Enclave establishes direct, point-to-point connections between systems. This approach simplifies the setup of secure, private access while ensuring that participating systems remain hidden and inaccessible by default.

By design, all systems within Enclave are “dark” to the public internet — isolated behind closed firewalls, unaware of one another, and unable to communicate until explicitly allowed. Connectivity is only granted on a strictly need-to-know basis.

Once a policy is defined, Enclave checks the security posture and establishes direct, end-to-end encrypted connections. Systems must mutually authenticate using digital certificates, meet conditional access constraints, and pass requirements such as multi-factor authentication (when configured) before communication is permitted.


Get Started with Enclave

If you're new to Enclave, check out our Getting Started Guide to get up and running in just a few minutes. Have questions or need help? Join our Slack community for answers and support. To learn more about Enclave’s secure connectivity model, visit our How it works page.

 

VPN Enclave
Serverless VPN Server
Hub and spoke architecture
Serverless
Peers connect directly using UDP/TCP hole punching
On-demand connectivity Always on
Tunnel is either on or off
On-demand
Tunnels are per-system, and don't need to be always on
Unreachable network Discoverable
VPN servers require open ports
(e.g. udp/500, tcp/443, udp/1194)
Unreachable
Outbound only traffic. No open ports or ingress
traffic, firewalls can be completely closed
Dynamic IP tolerant Site-to-site VPNs require ACLs to isolate
Client-to-site requires advanced IP knowledge to isolate
Works with dynamic IPs
You don't care where the "other side" is ahead of time
Low-ops Complex deployment
Segmenting is hard, configuration is complex
Low-ops deployment
Works on the network you've already got, no changes
Static IP address ❌ DHCP
Reservations for static IP
Static IP
Private, static IP addresses "out of the box"
DNS Run your own DNS server
No native support for DNS
DNS
DNS built-in, no nameservers required
Precision access Allows lateral movement
VPN places hosts directly onto the network
Zero Trust Network Access
Lateral movement prohibited, reduced attack surface

Supported Platforms

We support most major operating systems and CPU architectures.

Platform Architecture Status
Linux x64, arm, arm64 ✅ Supported
Windows x64, arm64, x86 ✅ Supported
MacOS x64, arm64 ✅ Supported
iOS x64, arm64 ✅ Supported
Android x64, arm64 ✅ Supported

Other resources

Stay in touch

Slack

We're building a community space for Engineers, Developers, Architects, Security Professionals, DevOps Practitioners and Hobbyists using Enclave to ask questions, get help from the team and interact with each other. Come and join us!

Join our Slack Community