VPN Infrastructure Overhead
Traditional VPNs require complex network configuration, expose entire networks, and create maintenance burden.
Connect Harmony proxies into a secure, distributed network. Enable authenticated communication between teams, organisations, and environments without complex VPN setups.
Traditional VPNs require complex network configuration, expose entire networks, and create maintenance burden.
Point-to-point connections often lack proper mutual authentication and verified chain of custody.
Connecting multiple sites, partners, and cloud services creates tangled network architectures that don't scale.
Data Mesh transforms individual Harmony proxies into nodes of a secure, distributed network. JWT-based mutual authentication creates a verified chain of custody, ensuring only trusted proxies communicate. Connect distributed systems as if they were local, abstracting away underlying network complexity.
Define how data enters and leaves your mesh within pipeline configuration.
Mutual authentication using Shared Secrets (HS256), RSA Keys (RS256), or cloud-managed credentials.
Reject traffic without valid cryptographic signatures from known mesh peers.
Update mesh definitions, rotate keys, or change routing rules with zero downtime.

Harmony sits between your systems as a secure gateway, handling ingestion, transformation, and routing of data across any protocol or network boundary, while Runbeam handles configuration and distributed access.
Install Harmony gateway nodes in your network. They stay completely behind your firewall—no direct external access required.
Use the Runbeam control plane to centrally manage configuration, policies, and authentication across all your gateways.
Configure data flows: ingest, transform, validate, and route across protocols and networks with full audit trails.
Explicitly define how data enters (Ingress) and leaves (Egress) your mesh within your pipeline configuration.
Self-managed security using Shared Secrets (HS256) or RSA Key Pairs (RS256) for complete control.
Managed authentication and automatic key rotation via Runbeam Cloud for simplified operations.
Configure endpoints in mesh mode to reject any traffic without a valid signature from a known peer.
Support for complex routing scenarios including cross-team API access and partner integrations.
Hot-reload mesh definitions, rotate cryptographic keys, or change ingress/egress rules without service interruption.
Traditional networking exposes entire networks or requires complex firewall rules. Data Mesh provides service-level, cryptographically verified connectivity between specific endpoints.
Built-in authentication ensures only trusted proxies communicate, creating a verified chain of custody for your data.
Connect distributed systems (e.g., on-premise PACS to Cloud FHIR Store) as if they were local, abstracting network complexity.
Enforce strict identity verification at the edge of every service boundary without manual certificate management.
Safely expose specific pipelines to partners or other internal teams without exposing your entire infrastructure.
Self-managed security for complete control over cryptographic material:
Managed authentication via Runbeam Cloud with automatic key rotation and simplified credential management.
Choose the mode that fits your security requirements and operational preferences. Switch between modes as your needs evolve.
Securely share training data across research institutions or hospital systems for collaborative model training. Build federated learning pipelines that respect data sovereignty and privacy requirements.
Enable privacy-preserving machine learning across organizational boundaries. Share model updates without exposing raw training data, maintaining compliance with data protection regulations.
Route production data to AI services across different geographic regions for real-time inference. Maintain low-latency connections while ensuring secure model access.
Enable secure API connectivity between teams or departments without VPN complexity. Each team runs its own Harmony instance, connected via mesh authentication.
Expose specific data pipelines to external partners with cryptographically verified access. Control exactly which services partners can reach.
Connect headquarters, regional offices, and remote sites into a unified data fabric. Eliminate site-to-site VPN configuration overhead.
Connect on-premise PACS systems to cloud-based FHIR stores across organisational boundaries. Maintain audit trails and consent-aware routing.
Data Mesh networking is built into Harmony Proxy, enabling mesh capabilities in both standalone deployments and Runbeam-orchestrated environments.
Configure mesh settings via TOML configuration files. Define ingress and egress endpoints, specify authentication modes, and establish trusted peer relationships—all as code.
Learn about Harmony Proxy →Define mesh ingress and egress within your pipeline configuration. Specify which endpoints accept mesh traffic and which can route to other mesh nodes.
Configure JWT signing and verification using shared secrets, RSA key pairs, or Runbeam Cloud credentials. All authentication material stays in configuration.
Update mesh topology, rotate keys, or modify access control without restarting Harmony. Configuration changes take effect immediately.
Enable authenticated cross-organisation connectivity without VPN complexity.