StreamGate

Private access for real internal apps, without exposing the whole network.

Outbound-only private routing

Your internal service, exactly where the consuming app expects it.

StreamGate does not connect entire networks. It places one exact private service behind one exact local host and port, through a permanently connected secure relay. No inbound port opening on the target side, no broad VPN blast radius, no “just use remote desktop” detours.

Key feature Connect the app to the service, not the user to the whole subnet.
Transport One outbound secure relay channel from every node.
Operator model Central dashboard, per-user access keys, live route control, version rollout.

How traffic moves

A consumer app talks to a local port, StreamGate carries the service traffic across the relay, and the provider node reaches the real internal service.

Consumer side Local app sees a familiar endpoint

Outlook, Jira integration, Confluence sync job or any legacy client connects to a local host and port on the consuming machine.

Client node CS listens locally and forwards by route key

The consumer-side agent binds the requested port and knows exactly which published remote route should receive the connection.

Relay M switches encrypted frames, not your whole LAN

The central relay stays on one public domain and one secure public entrypoint while routes, nodes, sessions and updates stay visible in the dashboard.

Provider side CS reaches the real internal target

The provider-side agent has direct access to the protected service and publishes it under a route key without opening the service itself to the internet.

Live path: Local app → CS → M → CS → internal service

Why teams choose it

It feels like a surgical tunnel for one service, not like dragging a whole private network through a corporate workaround.
That matters when the real job is “make Outlook see Exchange”, “make Jira talk to that internal endpoint”, or “make one legacy integration reach one locked-down system” without giving away more access than necessary.

Trusted by fast-moving mid-market teams

A representative set of the kind of companies StreamGate is built for: logistics operators, regional SaaS products, manufacturing IT teams, healthcare platforms and internal ops-heavy businesses.

Northline
Regional logistics
VERTOX
Industrial systems
BlueMesa
B2B SaaS operations
KELVIA
Healthcare platforms
ForgeLane
Manufacturing IT
OPSGRID
Infrastructure teams

Built around the exact problems other tools make clumsy

StreamGate is strongest where VPNs are too broad, public tunnels are too generic, and static port forwarding is too brittle.

Try with the client
Outbound-only from both edges

You do not need inbound reachability on the consumer or provider node. Every node holds one outbound secure relay connection and stays ready for new sessions.

Route by meaning, not by infrastructure guesswork

A provider publishes `exchange-main`, a consumer listens on a precise local port, and the app keeps using the endpoint shape it already understands.

Operate centrally, deploy incrementally

The relay dashboard shows nodes, routes, sessions, traffic, user access, client/server versions and rollout controls in one place.

How one route becomes a working service

Four short steps, zero network acrobatics on the consuming app itself.

1. Publish on the machine that can reach the target

That node owns the real connectivity to Exchange, Jira, Confluence, SQL, RDP or any other internal service.

2. Listen where the user app expects to connect

The consuming node exposes a local port and points it at the chosen remote route key.

3. Let M stitch the secure session

The relay selects the online provider, opens a tunnel session and forwards encrypted frames only after the secure handshake finishes.

4. Keep visibility the whole time

Operators see which user, which node, which route and which session are currently active, plus who needs updating.

Great fit for awkward real-world internal apps

Especially where “just use a VPN” creates too much risk or too much friction, and the real job is simply to make one internal endpoint behave locally.

Outlook ↔ Exchange

Keep Autodiscover and Exchange endpoints reachable from the right machine without publishing the mail server broadly.

Jira / Confluence / internal portals

Bring internal web services onto a trusted local endpoint path on the consumer side while the provider node stays close to the real service.

Legacy integrations and admin tools

When a client wants “host:port” and nothing else, StreamGate gives it exactly that shape instead of a whole remote network context.

SQL Server / PostgreSQL / Redis

Let a desktop client, BI tool or migration script talk to a database through a tightly scoped local endpoint instead of a network-wide tunnel.

Internal APIs and admin panels

Expose a specific protected backend or operator UI to the one workstation or environment that needs it, without publishing the whole application tier.

RDP / SSH / maintenance ports

Reach a specific maintenance path for a limited task when a broad remote-access policy would be excessive or politically difficult to approve.

License servers and legacy middleware

Some old enterprise software simply needs a reachable local endpoint. StreamGate can make that dependency appear locally with much less ceremony.

Build agents and CI/CD runners

Give one build worker access to one internal service dependency without turning the whole runner environment into a trusted network island.

Private registries and artifact stores

Connect package managers, deploy tools or mirrors to one protected source where the consuming host should see an ordinary local target.

Pricing is mailbox-based and easy to read

Visitors from the landing page can jump straight into the subscription page, check renewal status by email and see the current plan shapes before they buy.

Open subscription
Recurring Monthly
$7.99 / month

Best for predictable ongoing use where the same mailbox keeps one active access key and renews continuously.

Best value Yearly
$79.90 / year

The cheapest ongoing path when the deployment is already real and should remain alive without month-to-month friction.

Flexible Custom months or lifetime
From $8.99 / month or $399 lifetime

Useful when you need a short project window, a manual extension, or a one-time long-lived access model for a stable environment.

Compared with common alternatives

The point is not to replace every remote-access product. The point is to solve this very specific service-routing problem with less exposure and less operator pain.

Approach What usually happens StreamGate difference
Traditional VPN Users get broad network access they may not actually need, plus DNS, routing and policy edge-cases. Publish one service and consume one local port. The app gets what it needs, without dragging the whole subnet into scope.
Static port forwarding Hard to operate, hard to audit, painful when endpoints move, and usually awkward when both sides are behind restrictive networks. Route keys stay stable, nodes stay outbound-only, and the relay knows who is online before traffic is switched.
Generic public tunnel Great for demoing a port, weaker as an owned control plane for long-lived internal node fleets and user-scoped routing. Persistent node agents, dashboard governance, version rollout, user binding, node/app separation and service-shaped routing.
Remote desktop workaround People stop using the app on their own machine and start driving another machine just to reach one hidden service. The app keeps running where it already runs. StreamGate simply makes the missing service path appear locally.

Security posture that matches the architecture

Secure transport on a public domain, app-level authenticated handshake, encrypted frames after handshake, and explicit user/node/app ownership in the control plane.

TLS outside

Nodes reach the relay through one secure public edge behind one stable domain.

ECDH + HMAC + AES-GCM inside

Application-level secure session establishment happens before the relay starts forwarding payload frames.

User-scoped control

Routes stay bound to node ids, app instances stay individually addressable, and access keys can be managed, limited, blocked or revoked centrally.

Make one protected service usable, without turning the whole environment inside out.

Download the client, connect a node, publish the service that is already reachable from inside, and consume it from the machine that actually needs it.