Share +



CoIP enables enterprises to connect and secure cloud endpoints across multi-cloud environments.

CoIP® (Cloud over IP®) connects dispersed endpoints instantly and securely across multi-cloud environments as if they were in one unified private network. It protects by allowing enterprises to keep their security, physical networks, and compliance intact during deployments. CoIP shields production workloads and cloud endpoints through network encryption, east-west micro-segmentation, application interlock and whitelisting. CoIP can be integrated with existing network management platforms and security engines as well.

  • Multi-cloud Networking
  • Multi-cloud Security
  • Cloud Workload Isolation
  • Cloud Migration


CoIP Networking

The CoIP platform is a next-generation virtual overlay network that connects and secures multi-cloud environments, using but not changing the underlying IP network. CoIP presents one unified security network to applications, as if all resources were deployed in a single network, managed by the enterprise. It applies to clouds and enterprise on-premise environments.
Like VoIP, CoIP is an L4/L5 session and transport layer network running on top of the IP network. Since applications run on top of CoIP, they see it as a unified L3 network. This design decouples the inter-dependency of the northbound and southbound network protocols and configurations. Endpoints on the physical layer are virtualized on the CoIP network plane. From the applications viewpoint, the endpoints are still located in the physical plane.

  • Public Cloud Networking
  • Private Cloud Networking
  • Multi-cloud Networking

CoIP Security

CoIP provides in-depth security for multi-cloud networks that is deeply integrated with its on-demand virtual network overlay. CoIP protects specified endpoints, workloads and traffic in an exclusive shielded enclave with network encryption, east-west micro-segmentation and application whitelisting. CoIP enforces centralized control policy for routing and security, protects the new attack surface exposed by remote cloud endpoints and offers layers of security, defense-in-depth, that include active (inline) and passive (tap) flow capabilities for third-party security engine insertion.

  • Public Cloud Security
  • Private Cloud Security
  • Multi-cloud Security

Cloud Network Migration

The CoIP Platform is designed to support transparent and straightforward cloud workload migration using CoIP’s next-generation virtual overlay network. CoIP allows enterprises to define the legacy network environment in a virtual network plane so that the applications are decoupled from the underlying physical network. With CoIP, enterprises can choose the most appropriate migration strategy along the range from an “all-at-once” approach to migrating one application at a time without impacting applications in the legacy datacenter.

  • Public Cloud Migration
  • Private Cloud Migration
  • Multi-cloud Network Migration

CoIP Integration

Zentera offers a set of API interfaces to its CoIP platform. These APIs allow Zentera’s partners and customers to access the key features of CoIP programmatically. By providing APIs, CoIP can be incorporated into customers’ existing management and orchestration platforms. CoIP can be easily integrated into network services such as intrusion detection and protection systems (IDS/IPS), enabling them to operate across multiple cloud and enterprise environments. CoIP’s streaming capability includes support for active (inline) flow and passive (tap) flow. It enables existing enterprise on-premise security measures to be extended to remote cloud endpoints.

  • Third-Party Security Engine Integration
  • Multi-cloud Defense-in-Depth


Zentera performs a custom engagement with each customer to build out a solution that meets their specific needs.

Use Cases

  • Connecting multiple domains with protection
  • Network migration
  • Extend existing resources to remote sites
  • Burst to public, hybrid or private cloud
  • Business continuity via disaster recovery
  • Advanced network security with microsegmentation
  • Unifying network access and application security
  • Service automation and integration


Support for your software purchased via the Marketplace is rendered by the individual Software Provider. The CenturyLink Customer Care Team is unable to provide support for your software. However, if you are experiencing issues with the infrastructure that hosts your software, please open a ticket with Below you can find the contact information for support of this software.
2099 Gateway Place, Suite 420
San Jose, CA 95110

End User License Agreement (EULA)

By clicking the Agree & Continue button, you agree to the Provider's End User License Agreement (EULA) and/or Terms of Service associated with this software or service.
Not a customer? Register now.


Zentera Systems, Inc.



deployment models

  • Runner/Ansible

operating systems

  • CentOS 5
  • CentOS 6
  • Debian 6
  • Debian 7
  • RedHat Enterprise Linux 5
  • RedHat Enterprise Linux 6
  • RedHat Enterprise Linux 7
  • SUSE 11 64-bit CLI Support
  • Ubuntu 12
  • Ubuntu 14
  • Windows Server 2012
  • Windows Server 2012 R2