How it works

Overlay is a secure access layer, not a replacement.

Overlay provides secure, auditable access to building systems and operational networks without changing how those systems are deployed today. It integrates with the VPNs, remote tools, and protocols your engineers already use.

No new on-site hardware required.
No agents installed on controllers.
No network redesign or IP changes.

30-second explainer

At the heart of Overlay are connectors - lightweight, containerised services that connect to the site networks they need to reach.

Each connector:

  • Has access only to the specific network it is configured for
  • Is isolated from other connectors and customers
  • Has no inbound access from the internet

Connectors initiate outbound-only connections over VPN tunnels, meaning:

  • No firewall holes are required
  • No inbound ports need to be opened
  • NAT and private networks are fully supported

If a connector is disabled or removed, access stops immediately.

Architecture

User
Overlay webapp
Overlay connector
VPN tunnel
BMS controller

The flow

Fit-in architecture, modern controls.

Fit-in, not rip-out

Overlay works with your existing connectivity model, whether you use site-to-site VPNs, mesh networks, direct RDP/HTTPS, or jump hosts.

  • Connects to the same network paths your engineers already trust.
  • No software installs on BMS controllers.
  • No direct internet exposure.

Connectors: isolated, single-purpose access

Lightweight, containerised connectors run close to the systems they reach. Each connector is isolated, outbound-only, and scoped to specific networks.

  • No inbound firewall holes required.
  • NAT and private networks supported.
  • Disable a connector and access stops immediately.

Just-in-time sessions

Overlay grants access only when a session starts. Sessions are time-bound, routes are torn down, and credentials are discarded automatically.

  • No standing access.
  • No forgotten VPN connections.
  • No shared credentials.

Identity-based access

Overlay sits on your identity provider and enforces SSO and MFA policies you already have in place.

  • Access is tied to the individual, not a shared account.
  • Scope is limited to the customer or site.
  • No password reuse across sites.

Protocol-native sessions

Overlay supports protocol-appropriate access so engineers keep using familiar tools with predictable performance.

  • Web interfaces (HTTPS).
  • Remote desktop (RDP).
  • Vendor tools and TCP-based engineering protocols.

Full visibility and auditability

Every access attempt is logged, including who accessed what, when, and whether it was approved.

  • Answer who touched this system instantly.
  • Support customer reporting and audits.
  • No digging through firewall logs.

Security by design

Least privilege, assume breach.

No standing access

Users are never on the network by default.

Strong isolation

Each connector, customer, and session is isolated from the rest.

Outbound-only connectivity

Nothing inside your network accepts inbound connections.

Short-lived credentials

Access tokens and routes expire automatically.

Immediate revocation

Disabling a user or connector terminates access instantly.

🔧 Technical details (for IT & engineering teams)

Overlay plugs into the connectivity you already use. Give Overlay secure access to the same networks your engineers use today, and it provides audited, identity-based access without new tooling.

VPNs (OpenVPN / IPSec)

If you already use a corporate firewall or VPN (e.g. OpenVPN or IPSec), your sites will already be connected into a private network.

To onboard Overlay, you provide a VPN profile that allows an Overlay connector to join that network. The connector is placed into a subnet that can reach the IP addresses you want to access — for example, the hub network in a hub-and-spoke setup.

If you need stronger segregation, you can run multiple Overlay connectors, such as one per customer or network segment.

Mesh networks (WireGuard / ZeroTier)

If you already use a mesh network, onboarding is simple.

You provide the configuration needed for an Overlay connector to join the mesh — just like adding another site or device. Once connected, Overlay can reach any permitted devices on the mesh.

If you'd like to use a mesh network but don't already have one, we can supply an Overlay environment with a managed WireGuard instance pre-configured.

Remote desktop tools (RDP, VNC)

If you currently access sites using remote desktop software, Overlay can broker those connections for you.

The same applies to RDP or VNC: Overlay needs network access to the host (via VPN or mesh, as above), and the login details are entered once when the resource is created. After that, authorised users can connect with a single click.

For other remote or virtual desktop technologies, please contact us to discuss support.

Overlay compatibility illustration

Guided setup. Adapts to your network, fast.

In short

Overlay gives you modern access without disruption.

Modern, identity-based access.
Reduced attack surface.
Clear audit trails.
Faster onboarding for engineers.
Less operational risk than traditional VPNs.

Ready to move?

Solve remote connection pain in minutes, not years.