Why teams choose it
Trusted by fast-moving mid-market teams
A representative set of the kind of companies StreamGate is built for: logistics operators, regional SaaS products, manufacturing IT teams, healthcare platforms and internal ops-heavy businesses.
The feeling we want from the product
Calm operator control on one side, real secure infrastructure on the other, and a user app that simply works where it already lives.
StreamGate is strongest when operators need to see nodes, versions, routes and active sessions instead of guessing whether an ad-hoc tunnel is still alive.
No detour into a whole remote desktop or a broad VPN context just to reach one missing endpoint.
You expose a service path through a node that already has access, not the whole surrounding network perimeter.
Built around the exact problems other tools make clumsy
StreamGate is strongest where VPNs are too broad, public tunnels are too generic, and static port forwarding is too brittle.
You do not need inbound reachability on the consumer or provider node. Every node holds one outbound secure relay connection and stays ready for new sessions.
A provider publishes `exchange-main`, a consumer listens on a precise local port, and the app keeps using the endpoint shape it already understands.
The relay dashboard shows nodes, routes, sessions, traffic, user access, client/server versions and rollout controls in one place.
How one route becomes a working service
Four short steps, zero network acrobatics on the consuming app itself.
That node owns the real connectivity to Exchange, Jira, Confluence, SQL, RDP or any other internal service.
The consuming node exposes a local port and points it at the chosen remote route key.
The relay selects the online provider, opens a tunnel session and forwards encrypted frames only after the secure handshake finishes.
Operators see which user, which node, which route and which session are currently active, plus who needs updating.
Great fit for awkward real-world internal apps
Especially where “just use a VPN” creates too much risk or too much friction, and the real job is simply to make one internal endpoint behave locally.
Keep Autodiscover and Exchange endpoints reachable from the right machine without publishing the mail server broadly.
Bring internal web services onto a trusted local endpoint path on the consumer side while the provider node stays close to the real service.
When a client wants “host:port” and nothing else, StreamGate gives it exactly that shape instead of a whole remote network context.
Let a desktop client, BI tool or migration script talk to a database through a tightly scoped local endpoint instead of a network-wide tunnel.
Expose a specific protected backend or operator UI to the one workstation or environment that needs it, without publishing the whole application tier.
Reach a specific maintenance path for a limited task when a broad remote-access policy would be excessive or politically difficult to approve.
Some old enterprise software simply needs a reachable local endpoint. StreamGate can make that dependency appear locally with much less ceremony.
Give one build worker access to one internal service dependency without turning the whole runner environment into a trusted network island.
Connect package managers, deploy tools or mirrors to one protected source where the consuming host should see an ordinary local target.
Pricing is mailbox-based and easy to read
Visitors from the landing page can jump straight into the subscription page, check renewal status by email and see the current plan shapes before they buy.
Best for predictable ongoing use where the same mailbox keeps one active access key and renews continuously.
The cheapest ongoing path when the deployment is already real and should remain alive without month-to-month friction.
Useful when you need a short project window, a manual extension, or a one-time long-lived access model for a stable environment.
Compared with common alternatives
The point is not to replace every remote-access product. The point is to solve this very specific service-routing problem with less exposure and less operator pain.
| Approach | What usually happens | StreamGate difference |
|---|---|---|
| Traditional VPN | Users get broad network access they may not actually need, plus DNS, routing and policy edge-cases. | Publish one service and consume one local port. The app gets what it needs, without dragging the whole subnet into scope. |
| Static port forwarding | Hard to operate, hard to audit, painful when endpoints move, and usually awkward when both sides are behind restrictive networks. | Route keys stay stable, nodes stay outbound-only, and the relay knows who is online before traffic is switched. |
| Generic public tunnel | Great for demoing a port, weaker as an owned control plane for long-lived internal node fleets and user-scoped routing. | Persistent node agents, dashboard governance, version rollout, user binding, node/app separation and service-shaped routing. |
| Remote desktop workaround | People stop using the app on their own machine and start driving another machine just to reach one hidden service. | The app keeps running where it already runs. StreamGate simply makes the missing service path appear locally. |
Security posture that matches the architecture
Secure transport on a public domain, app-level authenticated handshake, encrypted frames after handshake, and explicit user/node/app ownership in the control plane.
Nodes reach the relay through one secure public edge behind one stable domain.
Application-level secure session establishment happens before the relay starts forwarding payload frames.
Routes stay bound to node ids, app instances stay individually addressable, and access keys can be managed, limited, blocked or revoked centrally.
Make one protected service usable, without turning the whole environment inside out.
Download the client, connect a node, publish the service that is already reachable from inside, and consume it from the machine that actually needs it.