The Network You'd Build If You Could Start Over

ZeroTier creates secure, programmable network overlays that connect devices, infrastructure, and applications anywhere.

Overview

How ZeroTier works

ZeroTier replaces physical network boundaries with cryptographic identity and secure peer‑to‑peer connectivity.

Each network member is identified, authenticated, and connected using four core mechanisms:

Each network member is identified, authenticated, and connected using four core mechanisms.

ZeroTier graphic showing a Router, Laptop, and Tablet with "Authorized" and "Not Authorized" status, illustrating Zero Trust access control.

The Platform Stack

The platform stack

ZeroTier combines lightweight software agents, a secure peer‑to‑peer networking layer, and a flexible control plane to create a distributed networking platform.

Agents and Clients
Data Layer
Control Layer
UI
Agents and Clients
Data Layer
Control Layer
UI

Agents and clients

Every device that joins a ZeroTier network runs a lightweight software agent.

This agent installs as a background service and creates a virtual network interface on the host system.

The agent:

Agents run across servers, desktops, mobile devices, routers, and embedded systems

Data layer

The ZeroTier data layer forms a secure peer‑to‑peer overlay network.

Devices communicate directly whenever possible, establishing encrypted connections between nodes across the internet.

This enables:

Control layer

The control layer defines how networks behave.

Administrators use it to manage:

Control information is distributed to nodes, which enforce policy locally.

ZeroTier Central

ZeroTier Central provides the management interface for configuring and operating networks.

From Central, administrators can:

Organizations can also run self‑hosted controllers when they require full infrastructure control.

Command Line

ZeroTier Quantum is managed directly through command-line tools and APIs, giving operators full control over network configuration and behavior.

From these interfaces, teams can:

All configuration is distributed as cryptographically signed objects and enforced locally by each node.

Architecture

Flexible network design

ZeroTier networks operate as secure virtual overlays on top of existing infrastructure.

Connectivity is defined through identity and policy rather than physical topology.

Networks can span

Abstract pink, purple, and blue color blend symbolizing the flexible, dynamic, and secure ZeroTier network virtualization.
ZeroTier network diagram showing a Tablet connecting securely to the Data Center, successfully traversing a NAT device.

Simple.

Deploy networks in minutes using a lightweight client.

Resilient.

Peer‑to‑peer connectivity removes single points of failure.

Secure.

All traffic is authenticated and encrypted by default.

ZeroTier powers secure connectivity for organizations operating in the world's most demanding environments.

Core Features

Platform capabilities

ZeroTier enables modern distributed networking across environments.

Abstract ZeroTier brand graphic featuring a soft blue and cyan gradient shape on a light background.

Choose your platform

ZeroTier One

The networking platform trusted by millions of devices worldwide.

Simple to deploy. Infinitely flexible. Built for developers, operators, and distributed systems.

ZeroTier Quantum

The networking platform trusted by millions of devices worldwide.

Built for environments where security, sovereignty, and resilience are non‑negotiable.

Platform

ZeroTier One

ZeroTier One allows organizations and developers to create secure virtual networks that connect devices and infrastructure anywhere.

Networks can be deployed in minutes and scale globally with no specialized networking hardware needed.

Modern software‑defined networking for distributed infrastructure.

Abstract orange and purple gradient symbolizing flexible network architecture.
Abstract cyan, teal, and blue blurred gradient background texture.

Platform

ZeroTier Quantum

Secure networking for mission‑critical environments.

ZeroTier Quantum leverages deterministic networking and post‑quantum cryptographic security designed for environments where resilience and security are non-negotiable.

Trusted by

3M+ devices connected worldwide

Thales
CEF
Advantech
Active Security
BTG
Mateco
Swarmbotics AI
TD Synnex
Leidos
NTT Data
Astrion
Metropolis
KEYSIGHT
ForestRock
Superbet
AhorraMas
Teltonika
Mikrotik
Volvo
Mediapro
IEM
Wilson Group

Start building with ZeroTier

Create your first secure network in minutes.