Zero Surface Architecture
Make zero the new default
The Zero Surface Architecture is our answer to a fundamental problem in modern networking: traditional networks are exposed by default.
Devices can talk to each other. Services listen on public IPs. The LAN is flat. VPNs and firewalls try to contain the sprawl, but the architecture itself assumes trust – and attackers exploit it.


Zero Surface changes that completely
It eliminates the surface area attackers rely on by defaulting to no connectivity at all, unless explicitly permitted by policy. There is no static perimeter. No lateral movement. Just ephemeral, policy-bound connections that form when needed.
This is the architectural model behind evolving ZERO. It’s how we converge connectivity and security into a single platform that’s dynamic, encrypted, and invisible unless allowed.
What it replaces
Flat, any-to-any networks
Static tunnels and permanent VPNs
Trusted internal zones
Hub-and-spoke topologies
Exposed public IPs and default routing
What it becomes
All connections are outbound and authenticated
Every flow is encrypted, ephemeral, and policy-driven
Devices, apps, and users are microsegmented by default
Up-and-out routing replaces internal mesh
Nothing is reachable unless explicitly allowed
How it works
Zero Surface begins with a deny-all stance. There is no default connectivity. LAN devices cannot see each other. Remote sites don’t auto-connect. There are no exposed ports, even across the WAN.
From there, access is built up dynamically:
ZTNA
ZTNA governs user and device access based on identity, posture, and policy.
Encrypted tunnels
Encrypted tunnels form only when allowed – scoped to a single session or resource.
Secure Web Gateways
All internet traffic is directed through Secure Web Gateways, with full policy and logging.
Segmented and restricted
IoT, OT, and unmanaged devices are segmented and restricted to only what they need – by port, IP, or identity.
Legacy tools
Legacy tools can be placed behind app connectors or access gateways to enforce Zero Trust rules even within the LAN.
The result is a network fabric with zero ambient trust – one where connectivity is temporary, encrypted, and fully observable.
Why it matters
Reduces attack surface to near-zero
No open ports. No discoverable infrastructure. No idle services to scan.
Prevents lateral movement by design
Devices can’t talk unless policy allows it – even on the same LAN.
Built for real-world infrastructure
Works across remote sites, mobile devices, cloud workloads, and legacy networks.
Policy replaces perimeter
Every flow is authorised, encrypted, and auditable – no matter where it originates.
No rip and replace
Can run alongside existing infrastructure and identity providers, or replace it wholesale.
Use cases
Replace static VPNs with dynamic, policy-based access
Secure internal apps with ZTNA and posture-aware authentication
Enforce least-privilege for IoT, VoIP, and unmanaged devices
Block lateral movement within LANs and between sites
Deliver encrypted access to SaaS, cloud, and internal services from any location
Simplify segmentation without managing VLANs, ACLs, or static rules

Start small, or go full fabric
Organisations can adopt the Zero Surface Architecture incrementally:
Deploy a single EVX node at a branch to replace VPN and firewall rules
Use ZTNA to secure internal apps without exposing networks
Move one user group off VPN using identity-based access with posture checks
Or go all in:
Deploy EVX across sites
Replace SD-WAN with intelligent encrypted overlays
Build a fully integrated, identity-aware fabric across LAN, WAN, and cloud
Make every access request ephemeral, encrypted, and verifiable
Built into evolving ZERO
The Zero Surface Architecture isn’t a bolt-on – it’s how evolving ZERO is built from the ground up:
Secure Access Fabric
The encrypted transport layer that enforces micro-segmentation and policy
ZTNA & App Access
Identity-based access to apps, with posture and session enforcement
Secure Web Gateway
Inline filtering and control of internet traffic
Zero Trust Segmentation
Identity- and intent-based flow control across all network layers
Encrypted Overlays
Replace traditional SD-WAN with flexible, dynamic tunnels
Organisations can adopt the Zero Surface Architecture incrementally:
The Up and Out Topology defines how Zero Trust networks should behave structurally. Instead of assuming mutual reachability, it isolates every node in its own segment and allows only outbound connections to explicitly authorised destinations.
Endpoints exist in their own isolated space (/32s)
All traffic is outbound to the platform for enforcement
No peer-to-peer flows, no default routes, no exposed services
The topology underpins multiple components of evolving ZERO, including Zero Trust Segmentation, ZERO SD-WAN, and the Zero Trust Guest Gateway.
