Step 1
Set up your HubThe Hub coordinates who belongs in the mesh, what policy applies, and what operators can see.
PumaMesh connects the places where data lives, then lets approved data move directly when it can and through a controlled Relay when networks get complicated.
A Hub coordinates policy and visibility. Agents run where data lives. Relays help cross hard network boundaries. Buyers get one platform for secure movement instead of a stack of transfer, VPN, acceleration, and audit tools.
The first-read story is intentionally simple: PumaMesh gives every environment a shared policy and visibility model, then chooses the cleanest secure path for each transfer.
Step 1
Set up your HubThe Hub coordinates who belongs in the mesh, what policy applies, and what operators can see.
Step 2
Install Agents where data livesAgents run on servers, laptops, clusters, cloud systems, and edge devices so policy follows the data source.
Step 3
Move directly when possibleWhen two Agents can reach each other, approved data moves directly instead of being forced through a central choke point.
Step 4
Relay when neededRelays help cross firewalls, partner boundaries, and constrained networks without exposing plaintext or merging infrastructure.
The Hub does four things. If it ever goes offline, every node keeps moving data under the last policy it received — no outage, no blockage. Wherever you run it — public cloud, private data center, or an air-gapped enclave — the mesh behaves the same.
Roster
Keeps the signed list of every node on the meshThe Hub knows who is on the network, what each node is allowed to do, and who their peers are. Every entry is signed. When a node joins or leaves, the Hub announces it and every peer updates in place.
Policy
Distributes the rules that govern movementWho can move what, where, and under which classification. Policy versions are signed and travel to every node as a bundle. A change at the Hub propagates to the mesh; no node has to be restarted for the new rules to take effect.
Identity & Keys
Issues, rotates, and revokes every node’s identityEvery node carries a post-quantum-signed identity that the Hub issued. Rotation and revocation happen on the Hub’s schedule. Nothing is shared on disk; no plaintext secret ever leaves the Hub.
Visibility
One operator view of the whole meshNode health, transfer history, policy drift, audit chain — one console, one source of truth. Evidence is a byproduct of every action, not a project that happens after the fact.
If the Hub is unreachable: every node keeps moving data under the last policy bundle and roster it received. Direct peer connections stay open. When the Hub comes back, it resyncs and audit catches up automatically.
A Relay is the Hub running in forwarding mode. Same software, different role. It never holds a key. It never unlocks payload. It exists to make hard networks easy.
Two networks that cannot see each other
Connect without merging networksYour training environment and your production environment have no direct route, by design. A Relay sits between them and forwards only what policy allows. Neither side has to trust the other’s network — only the Relay, and only for the transfers the policy names.
Restrictive firewalls
Transfers keep flowing when direct ports are locked downWhen outbound ports are closed or a firewall blocks the direct peer, a Relay handles the path. Every node stays inside its security zone; the Relay does the forwarding. The mesh adapts automatically — no VPN to configure, no exception list to maintain.
Partner and B2B exchange
Two organizations exchange data without sharing infrastructureCross-agency workflows, customer-to-vendor pipelines, research collaborations — a Relay lets two groups exchange data without sharing network infrastructure. Each side trusts only the Relay and only for the transfers the policy authorizes.
Remote and intermittent sites
Extends the mesh across constrained and satellite linksForward operating bases, vehicle platforms, tactical edge deployments — a Relay carries the mesh across satellite or intermittent links, buffers when the link is down, and reconciles automatically when it comes back.
Transport, encryption, routing, and acceleration — designed together, shipped together, operated together. Nothing is a plugin. Nothing is a retrofit.
Transport
A modern foundation, not 1990s plumbingData streams over many channels at once instead of a single pipe that plateaus at a few gigabits. That is how PumaMesh sustains 25.8 Gbps across the Pacific where every legacy tool collapses. We picked a modern foundation because it was the one clean place to put post-quantum encryption.
Encryption
Post-quantum, end to end, todayData at rest is protected with node- and agent-scoped key material. Every stream in flight is encrypted against a post-quantum cipher (ML-KEM-1024) that stops a future quantum computer from reading today’s captured traffic. Applications never see the encryption, and the current cryptographic stack uses wolfSSL 5.9.1.
Routing
Every node reaches every other nodeEvery node can reach every other node, either directly or through a Relay. If a primary path fails, each node discovers alternative routes locally — no cloud controller to wait on. Visibility, communication, and the exchange of data between nodes are all governed by a robust policy engine built into the platform.
Acceleration
Tuned for bulk transfer, not browsingThe off-the-shelf speed controller is tuned for browsing a web page. Ours is tuned for moving a 140 GB AI model across an ocean — which is why benchmarks hit 25.8 Gbps. And because the foundation is modern, speed never costs encryption, policy, or audit.
By collapsing the many disparate tools that Protect your data, give you better Understanding of your data, and Move it at high speed, PumaMesh Accelerates access to every byte you care about. Fewer software licenses. Fewer integration projects. Fewer audit chains to reconcile. One platform, one operator view, one ROI story.