Cyberight ZTMesh

ZTMesh is revolutionizing identity-based network access by unifying on-prem, cloud, and remote devices into a single virtual overlay network delivering unparalleled network security and simplicity.

Broad panoramic view of large city as night with a colorful overall and a mesh pattern to illustrate Optm's ZTMesh product
young blonde woman in professional dress using a smart phone while on subway platform

Virtual Mesh Overlay Network

ZTMesh creates a zero trust mesh overlay on top of your existing network. Scalable from small businesses to global enterprises, ZTMesh allows authorized users to easily access only approved business apps or services, while ensuring that all traffic is authenticated and encrypted.

rocket launching

Elastic Scalability

ZTMesh allows companies to migrate to a Zero Trust Architecture at their own pace; expanding from a small set of devices to an enterprise-wide deployment – all without any additional hardware.

handshake inside of a gear

Zero Configuration Changes

ZTMesh requires no configuration changes to firewalls or routers and works with existing network infrastructure to provide secure communications even with devices outside of a corporate network.

cloud with check mark

Superior Performance

With no need to route traffic through gateways or concentrators, ZTMesh improves network performance and avoids bottlenecks, no matter the number of users or devices.

Designed for Today's Workforce

ZTMesh enables organizations to secure their entire network across multiple clouds, offices, data centers, and homes.

Extend Network Security Beyond the Perimeter

Unlike perimeter-based security, ZTMesh facilitates secure networking by bringing strong endpoint protection to individual devices, creating a highly secure cybersecurity mesh without the cost of added hardware.

icon of lock inside of shield shape

More Secure

stopwatch icon

Lower Latency

icon showing a rocket ship taking off from an open laptop

Easier to Deploy

icon showing a computer with a thumbs up while hand is holding a wrench

Simple to Manage

icon showing a hand with a coin going into it

More Affordable

Secure Access from Anywhere

ZTMesh was built for today’s mobile and remote workforce and for both on-prem and cloud services, allowing employee devices or servers to migrate across different networks and geographies without disrupting network services or compromising security – making it an ideal way to deploy a work-from-anywhere security solution.

Secure on-premise & cloud access
All traffic authenticated and encrypted
No adjustments to firewalls or routers
woman using laptop on rock/beach setting
Young male professional using computer in bright, modern office. Screen is displaying Cyberight ZTMesh product user interface.

Simplified, Centralized Management

Unlike traditional environments comprised of VPN gateways, firewalls, and disparate configurations, ZTMesh is securely managed from anywhere through it's web-based portal. The intuitive management porta it easy to configure and manage your entire network, allowing for uniform access control policy management across an organization.

User and device access rules can be managed by:

Projects
Teams
Groups
Classes of Service
Any Combination of Attributes

Time-saving, Real-time Answers

ZTMesh includes powerful reporting, offering unique views of network security activity and events all in a single dashboard. Views can be filtered and surfaced by attributes and correlated events across multiple devices, including:

Authentications
Traffic Flows
Policy-Based Denials
Traffic Volume

Administrators can identify and act on security events, usage hotspots, unused services, and active vs. dormant users with ease.

Optm ZTMesh Korlate dashboard user interface showing an assortment of graphs and data

Learn More About Cyberight ZTMesh

Contact us to learn more about how ZTMesh can help further your organization's journey toward ZTNA.