No request reaches your systems without identity.

Identity, access, and enforcement — built into one system.

Access

Secure access to apps, servers, and databases — through one system.

Identity-Aware Proxy

Secure access to internal web applications without exposing them.
Every request is authenticated and enforced before reaching your apps.
Built-in controls include identity verification, access policies, and request-level enforcement — no code changes required.

SSH Bastion

Access servers without VPNs or static keys.
Every session is authenticated and enforced before connection is established.
Built-in safeguards include short-lived credentials, session controls, and full auditability.

SQL Bastion

Access databases with identity-based, query-level control.
Every query passes through a multi-layer enforcement pipeline before execution.
Built-in safeguards include validation, rate limiting, permission checks, and automatic query constraints.

Identity

Authentication, directory, and identity management — built in.

OIDC Provider

Authenticate users with a built-in identity provider or your existing systems.
Every login is verified and enforced before access is granted.
Built-in support includes standard protocols, federation, and consistent access control.

Identity & Directory

Sync users and groups from your existing directory.
Every access decision is enforced consistently across all systems.
Built-in controls ensure changes apply instantly — disable a user once, revoke access everywhere.

ACME & CA

Issue and manage identities with a built-in certificate authority.
Every certificate is generated and enforced through a distributed trust model.
Built-in safeguards ensure keys are protected and never exposed in a single location.

Security

Protection and enforcement at every layer.

Clientless Access

Access systems directly from the browser without agents or VPNs.
Every connection is authenticated and enforced before access is granted.
Built-in controls establish secure sessions without requiring user-side software.

Protection

Protect access at every layer before it reaches your systems.
Every request is validated and enforced through multiple control points.
Built-in safeguards include filtering, rate limits, and policy-based enforcement.

L3 Network Access

HexonConnect light client over QUIC with device-authenticated access.
Every connection is authorized against group policy and identity attributes before traffic flows.
Built-in controls include per-peer firewall, group-based ACL, and seamless reconnection across networks.

Networking

Traffic management and connectivity, built into the gateway.

Load Balancing

Distribute traffic intelligently across services.
Every request is routed and enforced based on system health and policy.
Built-in safeguards ensure availability through health checks and automatic failover.

Resilience

Detect failures and recover automatically across the system.
Every request is protected against degraded or failing components.
Built-in safeguards prevent cascading failures and maintain stability.

Deployment Control

Control how traffic is released to new versions and changes.
Every request can be evaluated before reaching production systems.
Built-in capabilities include staged rollouts, validation, and controlled exposure.

Operations

Configuration, deployment, and administration.

Config as code

Define and manage the system through Git-based workflows.
Every change is tracked and reviewed
Built-in controls ensure validation, auditability, and safe rollback.

Operations Interface

Unified administration and automation interface.
Every action is structured, enforced, and auditable.
Built for automation and modern workflows.

Deployment

Run the system on your own infrastructure.
Deploy consistently across environments — from Kubernetes to bare metal.
Supports Helm, Docker, system packages, and standard VM-based setups.

Every capability. One deployment. Zero sprawl.