The Mesh · How data moves

The Mesh is the simple operating model behind PumaMesh.

PumaMesh connects the places where data lives, then lets approved data move directly when it can and through a controlled Relay when networks get complicated.

A Hub coordinates policy and visibility. Agents run where data lives. Relays help cross hard network boundaries. Buyers get one platform for secure movement instead of a stack of transfer, VPN, acceleration, and audit tools.

Two separate organizations federating via PumaMesh: each runs its own hub and peer-to-peer agents, and a relay lets them exchange data under policy without merging their networks.
How the Mesh Comes Together

Start with a Hub, add Agents, use Relays only when needed.

The first-read story is intentionally simple: PumaMesh gives every environment a shared policy and visibility model, then chooses the cleanest secure path for each transfer.

Step 1

Set up your Hub

The Hub coordinates who belongs in the mesh, what policy applies, and what operators can see.

Step 2

Install Agents where data lives

Agents run on servers, laptops, clusters, cloud systems, and edge devices so policy follows the data source.

Step 3

Move directly when possible

When two Agents can reach each other, approved data moves directly instead of being forced through a central choke point.

Step 4

Relay when needed

Relays help cross firewalls, partner boundaries, and constrained networks without exposing plaintext or merging infrastructure.

The Hub

Four jobs, one process. Cloud or no cloud — the mesh works.

The Hub does four things. If it ever goes offline, every node keeps moving data under the last policy it received — no outage, no blockage. Wherever you run it — public cloud, private data center, or an air-gapped enclave — the mesh behaves the same.

Roster

Keeps the signed list of every node on the mesh

The Hub knows who is on the network, what each node is allowed to do, and who their peers are. Every entry is signed. When a node joins or leaves, the Hub announces it and every peer updates in place.

Policy

Distributes the rules that govern movement

Who can move what, where, and under which classification. Policy versions are signed and travel to every node as a bundle. A change at the Hub propagates to the mesh; no node has to be restarted for the new rules to take effect.

Identity & Keys

Issues, rotates, and revokes every node’s identity

Every node carries a post-quantum-signed identity that the Hub issued. Rotation and revocation happen on the Hub’s schedule. Nothing is shared on disk; no plaintext secret ever leaves the Hub.

Visibility

One operator view of the whole mesh

Node health, transfer history, policy drift, audit chain — one console, one source of truth. Evidence is a byproduct of every action, not a project that happens after the fact.

If the Hub is unreachable: every node keeps moving data under the last policy bundle and roster it received. Direct peer connections stay open. When the Hub comes back, it resyncs and audit catches up automatically.

The Relay

What a Relay is for — four real situations.

A Relay is the Hub running in forwarding mode. Same software, different role. It never holds a key. It never unlocks payload. It exists to make hard networks easy.

Two networks that cannot see each other

Connect without merging networks

Your training environment and your production environment have no direct route, by design. A Relay sits between them and forwards only what policy allows. Neither side has to trust the other’s network — only the Relay, and only for the transfers the policy names.

Restrictive firewalls

Transfers keep flowing when direct ports are locked down

When outbound ports are closed or a firewall blocks the direct peer, a Relay handles the path. Every node stays inside its security zone; the Relay does the forwarding. The mesh adapts automatically — no VPN to configure, no exception list to maintain.

Partner and B2B exchange

Two organizations exchange data without sharing infrastructure

Cross-agency workflows, customer-to-vendor pipelines, research collaborations — a Relay lets two groups exchange data without sharing network infrastructure. Each side trusts only the Relay and only for the transfers the policy authorizes.

Remote and intermittent sites

Extends the mesh across constrained and satellite links

Forward operating bases, vehicle platforms, tactical edge deployments — a Relay carries the mesh across satellite or intermittent links, buffers when the link is down, and reconciles automatically when it comes back.

Four foundational functions

Seamlessly integrated into one platform.

Transport, encryption, routing, and acceleration — designed together, shipped together, operated together. Nothing is a plugin. Nothing is a retrofit.

Transport

A modern foundation, not 1990s plumbing

Data streams over many channels at once instead of a single pipe that plateaus at a few gigabits. That is how PumaMesh sustains 25.8 Gbps across the Pacific where every legacy tool collapses. We picked a modern foundation because it was the one clean place to put post-quantum encryption.

Encryption

Post-quantum, end to end, today

Data at rest is protected with node- and agent-scoped key material. Every stream in flight is encrypted against a post-quantum cipher (ML-KEM-1024) that stops a future quantum computer from reading today’s captured traffic. Applications never see the encryption, and the current cryptographic stack uses wolfSSL 5.9.1.

Routing

Every node reaches every other node

Every node can reach every other node, either directly or through a Relay. If a primary path fails, each node discovers alternative routes locally — no cloud controller to wait on. Visibility, communication, and the exchange of data between nodes are all governed by a robust policy engine built into the platform.

Acceleration

Tuned for bulk transfer, not browsing

The off-the-shelf speed controller is tuned for browsing a web page. Ours is tuned for moving a 140 GB AI model across an ocean — which is why benchmarks hit 25.8 Gbps. And because the foundation is modern, speed never costs encryption, policy, or audit.

Why it matters

One binary replaces a stack of disparate tools.

By collapsing the many disparate tools that Protect your data, give you better Understanding of your data, and Move it at high speed, PumaMesh Accelerates access to every byte you care about. Fewer software licenses. Fewer integration projects. Fewer audit chains to reconcile. One platform, one operator view, one ROI story.