Skip to main content
Star us on GitHub Star

Cloak Your Network.
Secure Services not IPs

Sponsored by NetFoundry

Managing networks with static IPs, subnets, NAT, and firewalls is complex, fragile, and error-prone. As environments scale across cloud, hybrid, and mobile, traditional IP-based control falls apart. OpenZiti eliminates the headache by making identity—not IP—the core of your network. No more IP conflicts, no more guessing, just secure, zero-trust connectivity that works anywhere.

OpenZiti Network VisualizationOpenZiti Network Visualization

The Right Model For Your Needs

Implementing zero trust is a journey and every organization has different needs. Depending on your needs, one zero trust model may be better than another. Some organizations require different models for different needs. OpenZiti offers three distinct zero trust models, allowing your organization to form a zero trust overlay network that works best for you and allowing you to transform to a zero trust implementation at your own pace.

ZTAA

Zero Trust Application Access

The most comprehensive approach that secures app-to-app communications...

  • Achieve end-to-end app security with identity-based controls
  • Enable secure multi-cloud and hybrid deployments
  • Eliminate trust between application components

The ultimate goal for orgs seeking comprehensive zero trust security...

OpenZiti Network VisualizationOpenZiti Network Visualization

ZTHA

Zero Trust Host Access

Extends zero trust principles to secure host-to-host communications...

  • Create granular microsegmentation between applications
  • Protect lateral movement between workloads
  • Define identity-based policies for host communications

Perfect for orgs looking to secure east-west traffic in complex envs.

ZTNA

Zero Trust Network Access

Secures access to applications and services based on identity and context...

  • Reduce attack surface by hiding applications from the public internet
  • Enable secure remote access without VPNs
  • Apply least privilege access controls

Ideal for orgs beginning their zero trust journey with immediate security needs.

OpenZiti Network VisualizationOpenZiti Network Visualization

Why OpenZiti

OpenZiti's unique capabilities redefine secure networking for the modern age.

🧬

Strong Identities

IPs are not identities. OpenZiti leverages proven cryptographically verifiable identities.

🧠

Identity-Aware Access

Fine-grained authorization with posture checking ensures only valid identities are allowed to connect to services.

🔒

No Open Ports

Services completely vanish from the internet, becoming invisible to attackers and scan tools.

📦

App-Level Embedding

SDK integration brings zero trust directly into your applications, no agents required.

🔁

Smart Routing

The OpenZiti Fabric intelligently routes traffic through the optimal path for security and performance.

🔐

End-to-End Encryption

Libsodium-powered cryptography ensures data is secure in transit, always.

🧭

Private DNS

Authenticated, private DNS resolves service names to secure overlay tunnels, not IP addresses.

🕵️‍♂️

No Port Inference

Single-port transport prevents service fingerprinting and port scanning vulnerabilities.

Ready to Deploy Your Overlay?

Whether you're looking for enterprise-grade support or prefer to self-host, NetFoundry and OpenZiti offer flexible deployment options to meet your needs.

Enterprise Managed

Get fully managed zero trust networking with NetFoundry's enterprise offering, complete with SLAs and 24/7 support.

Learn More

Self-Hosted

Deploy and manage your own OpenZiti network with our comprehensive documentation and community support.

View Deployment Guide
Join the Community