Regulatory Deadline

TLS certificate lifetimes drop to 100 days in March 2027. That's ~365 renewal events per year per 100 services — before it drops to 47 days in 2029. Manual cert management doesn't survive this. See what Enclave does about it →

Operational Security Infrastructure

Zero trust security that doesn't require
a security team.

Most mid-market teams have compliance requirements, audit findings, and an IT team that's already stretched. The answer to that problem shouldn't be "hire three more people and buy four more tools."

Enclave is operational security infrastructure. Not a monitoring tool. Not a mesh VPN. Not a point solution. It is the foundational layer that gives lean teams the controls they need to pass audits, segment their networks, and manage certificates — without staffing a security department.

★★★★★ 4.8 stars · 55+ reviews
Enclave One agent. Three modules.

Asset Visibility

80+ data points per host. Continuous vulnerability scanning. Network discovery for what you didn't know you had.

Network Segmentation

Automated microsegmentation. Identity-aware access. Replaces flat networks and VPN without hardware or VLAN reconfiguration.

Certificate Lifecycle Management

Issue, distribute, and roll certificates automatically. At 47-day lifetimes, this isn't optional infrastructure anymore.

🛡️  Maps to  CIS v8 Controls
✅  NIST CSF aligned
✅  CMMC Level 2 ready
✅  HIPAA / PCI DSS supported
🆓  Free tier — no credit card
What Enclave Solves

Three gaps that show up in nearly every security assessment — and that most lean teams can't staff for individually.

Asset inventory on a spreadsheet. A flat network where one compromised machine can reach everything. Certificates nobody is tracking. These aren't edge cases. They're the findings your auditor will hand you.

You can't protect what you can't see — most organizations don't have automated asset inventory, and can't answer "what's on your network?" with confidence.

Flat networks are the number one assessment finding. One compromised endpoint reaches everything. Segmentation limits blast radius — and most teams skip it because the alternatives require hardware or VLAN reconfiguration.

Certificate-related outages are preventable. Most happen because no one knows what certificates exist, when they expire, or who owns them. At 100-day lifetimes, manual tracking doesn't survive.

Enclave closes all three gaps with a single agent, a single console, and a generalist IT team — no dedicated security staff required.

Enclave How Enclave Works

One agent. Three modules. Everything in a single console.

Each module solves a distinct problem. Together, they give a lean IT team the control that most organizations split across three or four separate tools — or skip entirely.

Asset Visibility

What it solves

You can't protect what you can't see. Most lean teams run asset inventory on spreadsheets — or not at all. When an auditor asks "what's on your network?" the honest answer is usually "we're not sure."

Deploy the agent, and within minutes you have a more complete asset inventory than most organizations build in a quarter.
  • 80+ data points per host — hardware, software, OS, certs, ports, firewall rules, patch status
  • Vulnerability discovery using NVD, Microsoft MSRC, Ubuntu, RedHat, and Debian advisories
  • Daily scans with EPSS scoring per finding
  • Network discovery scans for agentless devices
  • Service account and local user visibility — non-human identities captured as part of host inventory
  • Certificate discovery on common TLS ports
CIS v8 Mapping
CIS 1.x — Asset Inventory CIS 2.x — Software Inventory CIS 7.x — Vulnerability Mgmt

Network Segmentation

What it solves

Flat networks are the number one finding in security assessments. If an attacker or ransomware lands on one machine, they can reach everything. Segmentation limits blast radius — and most organizations skip it because the alternatives require expensive hardware or complex VLAN configurations.

A generalist IT team can segment a flat network into isolated enclaves in an afternoon — no VLAN reconfiguration, no firewall appliance, no security engineer required.
  • Automated microsegmentation via an encrypted overlay network
  • Label-based firewall rules controlling which groups can communicate
  • Host-based firewall management on Windows (WFP) and Linux (nftables) — macOS support planned
  • EOL system isolation — no hardware replacement required
  • Gateway support for agentless devices
  • SaaS Access Control — egress routing forces all IdP auth (Entra ID, Okta) through a known IP; combine with conditional access policies and users must be on Enclave to reach your SaaS apps
  • Session-based user access — authentication flows through your IdP (Google, Microsoft, Okta, JumpCloud), so MFA configured there can't be bypassed to connect
CIS v8 Mapping
CIS 3.x — Data Protection CIS 4.x — Secure Config CIS 12.x — Network Mgmt CIS 13.x — Network Defense

Certificate Lifecycle Management

What it solves

Certificate-related outages make headlines regularly. Most organizations have no visibility into what certificates exist, when they expire, or who owns them. Renewal is manual, error-prone, and the first thing forgotten when the team is busy.

Organizations using Enclave CLM eliminate certificate-related outages and manual renewal tracking entirely.
  • Full trust chain management — Enclave-managed or BYOCA root CAs
  • Issue certificates to nodes and users via issuance policies
  • Auto-distribute root trust via trust policies
  • RSA 2048/4096, ECDSA P-256/P-512, Ed25519 support
  • On-issued scripts for automatic service reload
  • Rolling root and intermediate certificates — zero downtime
  • Certificate discovery scans on common TLS ports
CIS v8 Mapping
CIS 3.x — Data Protection CIS 5.x — Access Control CIS 6.x — Account Mgmt
VPN Replacement

Still running a VPN? That's a flat network with extra steps.

A VPN gets users onto your network. Enclave controls what they can reach once they're on it. That's the difference between access and security.

Enclave replaces site-to-site and remote access VPN with identity-aware microsegmentation. Session-based credentials. Authentication flows through your identity provider — if MFA is configured there, users can't bypass it to connect. Users reach exactly what policy allows and nothing else.

See how the migration works
Traditional VPN
  • Places users on the full network
  • Flat trust once connected
  • MFA optional or bypassed
  • No asset inventory
  • No certificate management
  • No vulnerability scanning
Enclave
  • Identity-aware microsegmentation
  • Least-privilege by policy
  • IdP-enforced auth — MFA configured at your provider can't be bypassed
  • 80+ data points per host
  • Full certificate lifecycle management
  • Daily vulnerability scanning

"The question isn't size — it's whether HR should be able to talk to your production database."

Regulatory Deadline — CLM

Manual certificate management is no longer viable.

In April 2025, the CA/Browser Forum voted unanimously — Apple, Google, Mozilla, and Microsoft — to reduce maximum TLS certificate lifetimes on a mandatory phased schedule. Domain validation reuse drops to just 10 days. Let's Encrypt is already issuing 6-day certificates.

~800
Certificate renewal events per year, per 100 services, at 47-day lifetimes (2029). At 100 days (March 2027): ~365 per year. Spreadsheets and calendar reminders don't survive this cadence.

Most companies don't have automated CLM. Enclave ships it in the same agent that handles segmentation and asset inventory. The 100-day maximum hits March 2027 — less than 12 months away. Every organization not automating certificate issuance and renewal today is 11 months from operational disruption.

March 2026 — In Effect Now

200-day maximum TLS lifetime

Already mandatory. Organizations still on annual renewals are already out of cycle. ~183 renewal events/year per 100 services.

!
March 2027 — 11 Months Away

100-day maximum TLS lifetime

~365 renewal events per year per 100 services. Calendar reminders and manual processes break at this volume. Automated CLM becomes mandatory infrastructure.

March 2029

47-day maximum TLS lifetime

~800 renewal events per year per 100 services. No organization handles this manually. The question isn't whether to automate — it's which platform to use.

What Makes Enclave Different

One platform. Not three procurement decisions.

No other platform ships asset inventory with vulnerability scanning, automated microsegmentation, and full certificate lifecycle management in a single agent.

Enclave is operational security infrastructure for lean teams — asset visibility, network segmentation, and certificate lifecycle management in a single agent, without needing a dedicated security team to run it.

Tailscale and ZeroTier solve connectivity. Venafi and Sectigo solve certificates. EDR platforms like CrowdStrike and SentinelOne solve detection — and Enclave complements them by handling the infrastructure controls they don't cover.

If your team is already running point solutions for each of these problems, Enclave consolidates the management layer. You don't have to rip anything out.

Enclave is not
A monitoring tool
A mesh VPN
A point solution
Something that requires a security engineer to operate

Frequently asked questions

How is Enclave different from a VPN?

A VPN places users on your network. Enclave controls what they reach once connected. Enclave replaces VPN with identity-aware microsegmentation — users access exactly what policy allows. It also adds asset inventory, vulnerability scanning, and certificate management that VPNs don't provide.

How is Enclave different from Tailscale or ZeroTier?

Those are mesh VPN tools — they solve connectivity. Enclave solves security. The difference is microsegmentation with policy enforcement, host-based firewall management, asset inventory, vulnerability scanning, certificate lifecycle management, and a management console with RBAC and compliance dashboards.

Does Enclave require a dedicated security engineer?

No. Enclave is designed to be operated by a generalist IT team. The agent installs in minutes. The Enclave Management Console handles configuration, policies, dashboards, and alerts from a single web UI — no security background required.

What compliance frameworks does Enclave support?

Enclave maps to CIS Controls v8, NIST CSF 2.0, CMMC Level 2, NIST SP 800-171, ISO 27001, HIPAA, PCI DSS, and SOC 2 — with documentation against specific control numbers, not just framework names.

Is there a free tier?

Yes. The free tier includes 1 enclave, 3 nodes or user agents, and 1 managed beacon. No credit card required. The agent installs in minutes and delivers a live asset inventory and network map in your first session.

MSP & MSSP Partners

Built for partners who need infrastructure, not another tool to resell.

Enclave's multi-tenant console lets MSPs and MSSPs deploy and manage Enclave across their entire client base from one place. Embed it as your segmentation and asset management layer — your clients get the security, you reduce the operational overhead.

What partners get

A platform you can stand behind on a client call — with the compliance documentation, CIS v8 mapping, and control evidence that make your engagements faster to close and easier to deliver.

  • Multi-tenant Enclave Management Console
  • Volume pricing that scales with your client base
  • Co-branded deployment and onboarding support
  • Compliance dashboards and control mapping for client reporting

What your clients get

Enterprise-grade asset visibility, network segmentation, and certificate lifecycle management — deployed and managed by your team, without requiring them to hire a security engineer to operate it.

  • Continuous asset inventory and vulnerability scanning
  • Microsegmented network with host-based firewall enforcement
  • Automated certificate lifecycle — ready for 100-day TLS lifetimes
  • A single agent across Windows, Linux, macOS, Docker, and Kubernetes
Talk to us about partnering
Get Started

A working Enclave deployment in under an hour.

The agent installs in minutes. In your first session you'll have a live asset inventory and a network map — no sales call required before you see what Enclave actually does.

Free Tier

Try Enclave

$0
No credit card required

Test a real deployment. One enclave and three nodes is enough to see exactly how microsegmentation works in your environment — and enough to hit the ceiling and know you need more.

  • 1 enclave (microsegment)
  • 3 nodes or user agents
  • 1 managed beacon — relay not included; beacon deactivates after 1 week of inactivity
  • Enclave Management Console access
  • SSO via Google, Microsoft, Okta, or JumpCloud
  • Agent installs in minutes on Windows, Linux, macOS, Docker, Kubernetes
Ready to expand?

When you need more than 3 nodes or more than 1 enclave, reach out. We'll take it from there.

Create free account
Enclave + vCISO

The platform runs the controls. Your security leader runs the program.

Enclave handles the operational work — asset inventory, network segmentation, certificate management. SideChannel's fractional vCISO service handles the strategy, the board presentations, and the decisions that tooling can't make for you.

What Enclave handles

Continuous asset discovery. Microsegmented network with enforced firewall policies. Automated certificate issuance and renewal. Vulnerability scanning with daily updates. A single console your IT team can operate without a security background.

"Deploy the agent. Your environment maps itself. Your certificates manage themselves. Your network stops being flat."

What a vCISO handles

Security program strategy. Risk prioritization. Board and executive reporting. Compliance roadmap and audit readiness. Incident response planning. The judgment calls that require experience — not automation.

"Enterprise-grade security leadership, without the full-time hire. Your vCISO focuses on strategy because Enclave is running the controls."

Why they work together

Most security assessments produce a findings report and a roadmap. Enclave closes the infrastructure gaps the roadmap identifies. A vCISO turns the findings into a program with accountability and a plan. Together, you get the tooling and the leadership — without building a full security department.

"Your vCISO builds the program. Enclave runs the controls."
Framework Support

Map capabilities to controls, not categories.

Enclave's CIS Controls v8 documentation gives you the control mapping your auditor needs — not just a feature list to interpret yourself. Pair Enclave with SideChannel's fractional vCISO services for the full program.

NIST CSF 2.0
CIS Controls v8
CMMC Level 2
ISO 27001
HIPAA
PCI DSS
SOC 2
NIST SP 800-171

The 100-day certificate deadline is 11 months away. Is your network segmented? Do you know what's on it?

Enclave closes all three gaps — asset visibility, network segmentation, certificate lifecycle management — and a generalist IT team can run it today.

Questions? info@sidechannel.com