Example 1
Teltonika RUT on site, forwarding to the BMS
Overlay keeps the model the same whether the site uses Overlay-managed connectivity or the operator's own network path.
How Overlay Works
Overlay gives BMS teams a controlled way to reach building resources without defaulting to broad, site-wide VPN access. Customers get a clearer access model. Engineers get a consistent workflow.
The result is easier governance across mixed estates, stronger auditability, and a rollout approach that fits how building portfolios actually operate.
The Overlay model
Access is convenient for users but secured to exacting enterprise standards.
How Access Works
Overlay keeps the workflow straightforward for engineers while centering the access decision on identity, policy, and the requested resource.
The engineer or operator authenticates as a named user instead of starting from a site VPN profile.
Overlay checks organisation requirements such as access scope and MFA before the session starts.
The user requests the exact head-end, controller, or machine they need rather than broad site presence.
Overlay opens the requested session and produces evidence that the action was initiated by that named user.
Example Deployments
These examples are grounded in the capabilities described in the docs: connector-brokered sessions, support for existing VPN-style connectivity, and an Overlay-managed connectivity option where a suitable site path does not already exist.
Example 1
Overlay keeps the model the same whether the site uses Overlay-managed connectivity or the operator's own network path.
Example 2
The same two connectivity options apply even when the head-end is on a local PC and no Teltonika router is required.
Example 3
Overlay also fits hosted environments where the head-end already sits in the operator's cloud estate rather than on site.
From broad tunnels to controlled sessions
This is the model behind Overlay's identity-based connectivity approach. A named user signs in, policy is checked, a specific resource is selected, a session is created for that request, and the connector brokers the path to the target.
The operational outcome is concise: access is attached to identity, scope, and session context instead of general network presence. That is what makes the model easier to govern across mixed BMS estates.
Control And Auditability
The objective is not to make every estate identical underneath. It is to make access control, session brokering, and auditability more consistent above that variation.
Access begins with an identified person, which reduces dependence on shared VPN or controller credentials.
Users ask for the building system or device they need, rather than inheriting general site network reach.
The access decision happens before the session is created, helping teams enforce MFA and role boundaries consistently.
A clearer record of who initiated access, in what context, and when.
The operator experience stays stable even when the underlying estate uses different site connectivity methods.
Where a site does not already have a suitable path, Overlay can provide the connectivity layer without changing the access model.
Deployment Fit
Overlay is intended for portfolios where site connectivity, devices, and operational practices vary from customer to customer. The user workflow remains consistent even when the underlying estate does not.

Managed Connectivity
Some customer estates already have a suitable path for secure access. Others do not. Overlay can extend the same session-based access model to those sites by providing the underlying connectivity layer as well.

Rollout
Overlay uses a familiar rollout process: confirm the estate fit, connect the sites, onboard the right users, and move into governed day-to-day access.
Map the current mix of customers, site connectivity, and remote-access requirements with Overlay.
Use existing site connectivity where suitable, or layer in Overlay-managed connectivity where it is missing.
Onboard engineers, operators, or contractors with the right access boundaries for the buildings they support.
Run day-to-day remote access through a model that is easier to review, explain, and scale.
Review The Model
The key question is simple: can remote access become easier to govern without making the field workflow harder to operate? Overlay is designed to do exactly that.
BMS-centric access model. Loved by IT teams.