Find out if you're a good fit for Zero Trust Network Access with an Overlay Mesh Network. Take the Assessment here.

Cookie Policy

Cookie Policy

Document Version 1.0 — Published March 17, 2020


We believe in being clear and open about how we collect and use data related to you. This cookie policy applies to our products and services which link to this policy or incorporate it by reference. We use cookies to collect and use data as part of our Services as defined in our Privacy Policy (“Services”). This policy provides detailed information about how and when we use such technologies.

By continuing to visit or use our Services, you are agreeing to the use of cookies and similar technologies for the purposes described in this policy.

Your choices

Browser controls

Most browsers allow you to control cookies through their settings, which may be adapted to reflect your consent to the use of cookies. Further, most browsers also enable you to review and erase cookies. To learn more about browser controls, please consult the documentation that your browser manufacturer provides.

If you’d like to delete cookies or instruct your web browser to delete or refuse cookies, please visit the help pages of your web browser. Please note, that if you delete cookies or refuse to accept them, you might not be able to use all of the features we offer, you may not be able to store your preferences, and some of our pages might not display properly.

Control which types of cookies we can store on your device by editing Cookie Setting preferences using the button below.

Technologies we use

Type of technology Description
Cookies A cookie is a small file placed onto your device that enables Enclave features and functionality. Any browser visiting our sites may receive cookies from us or cookies from third parties such as our customers, partners or service providers..

We use two types of cookies: persistent cookies and session cookies. A persistent cookie may help us recognize you as an existing user, so it’s easier to return to Enclave or interact with our Services without signing in again. A persistent cookie stays in your browser and will be read by Enclave when you return to our site. Session cookies last only as long as the session (usually the current visit to a website or a browser session).

What are cookies used for?

Below we describe the purposes for which we use these technologies.

Purpose Description
Essential We use cookies and similar technologies to recognise you when you visit our Services and remember information about your browser, session and preferences. We may also use essential cookies to help authenticate users and prevent fraudulent use of accounts. These cookies enable core functionality of our sites and can only be disabled by changing your browser preferences.
Performance We use cookies and similar technologies to make your interactions with our Services faster and more secure as well as to learn more about how well our Services perform in different locations.
Analytics We or our service providers use these technologies to understand, improve, and research products, features and services as you navigate through and use our sites.
Marketing We use cookies and similar technologies help us show relevant advertising to you more effectively.
Service Provider Domain Cookie Name Description
CloudFlare .enclave.io __cfduid This cookie is created by CloudFlare and necessary to deliver our services. The cookie is used to identify individual clients behind a shared IP address (such as in a shared office or coffee shop) and apply security settings on a per-client basis. It does not correspond to any user information in the website, and does not store any personally identifiable information.
Google Analytics .enclave.io _ga, _gid Used to distinguish users on the Google Analytics platform.
LeadFeeder .enclave.io _lfa, _lfa* Leadfeeder tracker adds a visitor cookie to collect the behavioural data of all website visitors. This includes; pages viewed, geographic location, company, visitor source and time spent on the site.
Enclave .enclave.io gdprcookienotice This cookie indicates is set once you’ve given consent to our use of cookies in the delivery of our services.
Google .google.com SIDCC, SID, __Secure-3PSID, __Secure-3PSIDCC, __Secure-3PAPISID, APISID, SAPISID, SSID, HSID, OGPC, ANID, CONSENT, SEARCH_SAMESITE, NID, 1P_JAR, OTZ, Sets a unique ID to remember your preferences and other information such as website statistics and track conversion rates. Google’s policies can be viewed at https://policies.google.com/technologies/types

Book a Demo

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll show you how to use Enclave to:
  • Introduce a zero-trust network access model
  • Avoid ACLs and VPNs to secure network access
  • Leverage your firewalls to darken your network
  • Protect against discovery, targeting and attack
After completing this form, a member of our team will contact you to arrange a short product demo at a time of your choosing.

Book a Demo

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll show you how to use Enclave to:
  • Introduce a zero-trust network access model
  • Avoid ACLs and VPNs to secure network access
  • Leverage your firewalls to darken your network
  • Protect against discovery, targeting and attack
After completing this form, a member of our team will contact you to arrange a short product demo at a time of your choosing.

Contact Sales

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll talk to you about how to:
  • Get secure network access without deploying a VPN or changing network settings
  • Easily automate and manage your network from our portal
  • Protect against discovery, targeting and attack.
After completing this form, a member of our team will contact you with additional information.

Contact Sales

Connect all of your computers, servers, cloud instances and containers across any infrastructure with secure private networks that just work. We'll talk to you about how to:
  • Get secure network access without deploying a VPN or changing network settings
  • Easily automate and manage your network from our portal
  • Protect against discovery, targeting and attack.
After completing this form, a member of our team will contact you with additional information.