Find out if you're a good fit for Zero Trust Network Access with an Overlay Mesh Network. Take the Assessment here.

Acceptable Use

Acceptable Use

Document Version 1.0 — Published February 07, 2023


Our acceptable usage policy (“AUP”) is designed to prevent fraud and abuse of our services, to ensure that all customers receive acceptable access to our services, and to protect the quality and integrity of our services. We may vary the terms of this AUP from time to time without notice, and will contact you using the details you’ve provided to inform you of the changes. We may monitor your account to check that this AUP is being followed.

Illegitimate Use

The following is a non-exhaustive list of practices that would be considered “Illegitimate Use”:

  • Using our services for unreasonable workloads we determine (in our sole discretion);
  • Re-selling our services or parts thereof to another party;
  • Using our services in a manner we determine (in our sole discretion) could cause harm to our services or another party; or
  • Unusual usage patterns inconsistent with those we reasonably consider as normal use when compared to other customers.
  • Other practices may be relevant in determining Legitimate Use and we reserve the right to take any unlawful, prohibited, abnormal, or unusual activity into account in making a determination.

If you use our services in any way which we reasonably determine (at our sole discretion) may be unlawful, prohibited, abnormal, unusual, or detrimental to our services or any of our other customers or other unrelated parties, we reserve the right to suspend or terminate your access without notice.

Excessive Use

Excessive use means you are exceeding one or more of the limitations allocated to your current subscription. We reserve the right to adjust these limitations from time to time without notice, and will contact you using the details you’ve provided in your Account to inform you of the changes.

If your use of our services is excessive we may contact you using the contact details you’ve provided to request that you modify your usage practices, or change to a more appropriate subscription. If, after our request, your usage practices continue to be excessive, or you refuse to change to a more appropriate subscription, we may suspend or terminate your access to our services immediately without notice.

Unreasonable, Unethical or Unlawful Use

Unreasonable Use

Unreasonable use of the Cloud Services and Software includes any re-selling or wholesaling of our services, or parts thereof, to another party. If your use of our services is unreasonable, we may contact you using the contact details you have provided to ask that you change the way you use our services.

Unlawful or Unethical Use

Enclave Networks is a responsible provider. We do not condone or support any use of our Products or Services in unlawful or unethical practices. We will always cooperate with Law Enforcement where legitimately and lawfully requested. Where we have reason to believe that users are carrying out unlawful activities with Our Products and Services we reserve the right to report this to Law Enforcement officials. In such circumstances Customer confidentiality will not apply. If we consider your use unreasonable (at our sole discretion) we reserve the right to suspend or terminate your access to our services without any prior warning or notice.

Book a Demo

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll show you how to use Enclave to:
  • Introduce a zero-trust network access model
  • Avoid ACLs and VPNs to secure network access
  • Leverage your firewalls to darken your network
  • Protect against discovery, targeting and attack
After completing this form, a member of our team will contact you to arrange a short product demo at a time of your choosing.

Book a Demo

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll show you how to use Enclave to:
  • Introduce a zero-trust network access model
  • Avoid ACLs and VPNs to secure network access
  • Leverage your firewalls to darken your network
  • Protect against discovery, targeting and attack
After completing this form, a member of our team will contact you to arrange a short product demo at a time of your choosing.

Contact Sales

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll talk to you about how to:
  • Get secure network access without deploying a VPN or changing network settings
  • Easily automate and manage your network from our portal
  • Protect against discovery, targeting and attack.
After completing this form, a member of our team will contact you with additional information.

Contact Sales

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll talk to you about how to:
  • Get secure network access without deploying a VPN or changing network settings
  • Easily automate and manage your network from our portal
  • Protect against discovery, targeting and attack.
After completing this form, a member of our team will contact you with additional information.