A look at how Bowtie's unique architecture and design helps make network conflicts, network sprawl, and challenges associated with RFC 1918 a thing of the past.
Blog
A detailed how-to on building an end-to-end deployment of Bowtie to access cloud networks. In this guide, Taylor Mello provides considerations, step-by-step instructions, and automation tips using Terraform to build secure, zero trust networks with Bowtie.
Bowtie's innovative architecture empowers businesses to access private resources without being in the middle of the process. This detailed post is the first in a series on our control plane, first delving into our use of Automerge—a 'Local First' conflict-free data type implementation. Discover how Bowtie achieves resilient, scalable, and partition-tolerant networking, facilitating seamless and efficient integration across multiple sites.
SASE: Secure Access Service Edge. What is it, why does it matter, and how does Bowtie fit into the puzzle?
The industry is hurtling towards the SaaSification of everything, but what does this mean for customers and vendors alike? This in-depth post explores the complex landscape of SaaS, highlighting both its promises and costs, especially in areas like security and autonomy. Through real examples and historical security failures, we suggest a more critical approach to embracing the SaaS model.
Learn how Bowtie uses Nix to build network appliance images, enabling us to support a variety of formats with a high degree of code reuse and an elegant upgrade process. Ensuring that network appliances are easy to run, test, update, and operate reliably is important and underpins Bowtie’s commitment to robust simplicity.
The who, what, and why of Bowtie. Mostly the why.
There is a better way to build enterprise networks. Bowtie is building for this future. The network is everywhere now.
See Bowtie In Action
Experience Bowtie's distributed overlay security platform in action. Book a demo to see how we can improve your network's security.