What is a Cyber Overlay?
A Cyber Overlay solution that employs Security VirtualizationSecurity Virtualization is a technology for delivering traditional network security functions through software instead of appliances, offering faster deployment times, easier management, and decoupling of security from infrastructure. to connect and protect applications, users, and data using Zero Trust Principles.
Zentera's CoIP® (Cyber over IP) Platform implements a Cyber Overlay with a suite of tools including powerful microsegmentation and identity-based access controls to quickly and easily protect corporate assets with a NIST SP800-207 Zero Trust Architecture. It orchestrates across all pillars of the CISA Zero Trust Maturity Model, helping customers to achieve Optimal levels with minimal effort.
Innovative and patent-protected, CoIP Platform can be used to protect a wide range of critical asset classes found in typical enterprise environments, including tiered applications, OT devices, and even entire datacenters.

Policy Decision Point (PDP)
The zCenter orchestrator is at the heart of the CoIP Zero Trust Fabric. zCenter is responsible for managing all identities, defining all policies, and is responsible for validating access requests to protected assets and orchestrating overlay connectivity.
Customers may deploy and manage their own private zCenter orchestrators, or use Zentera Air™ SaaS for a streamlined adoption experience.
Policy Enforcement Points (PEP)
The Policy Enforcement Point is one of the most critical parts of a Zero Trust architecture, as its placement defines the size of the implicit trust zone.
Our Zero Trust Fabric PEP options include:
- zLink agents, which deploy non-intrusively can enforce policies at the software process level;
- Gateway proxies, which can enforce access policies at a zone level; and
- Gatekeeper appliances, which deploy as a 'bump in the wire' to protect individual assets or subnets
Application Network
The Zentera CoIP Application Network is an overlay network; it provides a simple and powerful way to place critical assets, trusted servers, and authorized users together in a completely private network - even if they are all in different networks.
All CoIP components natively support the CoIP overlay, enabling simple and easy least-privilege access. Additionally, the CoIP ZNS overlay network switch enables global connectivity.
Virtual Chamber
A Zero Trust PEP can protect an asset only if the security architecture guarantees that all accesses go through the PEP.
CoIP Virtual Chambers elegantly control all packet traffic to a protected asset, ensuring the effectiveness of the PEP.