Cookie
FlexiHub Team uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our cookie policy. Click here to learn more.

At FlexiHub, security is our highest priority

Your data will be safe, both at home and in the workplace. Security is core to our design, with effort taken to strengthen every link in the connection path.
      Protection and encryption
      Protection and encryption

      All transferred data is encrypted using the TLS 1.2 protocol, which guarantees a safe data path with no probability of getting into the hands of the wrong people.

      End-to-end security
      End-to-end security

      We keep your data as secure as possible and always choose a point-to-point channel that passes fewer points. Even when the data goes through our servers, it stays encrypted and anonymous.

      Cloud architecture
      Cloud architecture

      All our servers are located in Akamai clouds, which allows us to be flexible and secure, and guarantees quick recovery if problems arise.

 alt

FlexiHub Architecture

FlexiHub routes your data through a simple, secure system. Your account and device data are sent separately, and most connection methods don't send device data through our servers.
 alt
Component 1 of 4

Central server

The heart of our system, responsible for authorization, connection routing and transmit server management.
 alt
Component 2 of 4

Redirection server

Redirects traffic if both computers are unable to make a direct connection.
 alt
Component 3 of 4

Web account

Manages subscription plans, nodes, tokens, team members, etc.
 alt
Component 4 of 4

STUN server

Allows a UDP connection to be established if one or both of the computers are connected to the Internet through a NAT router.
 alt

Connection channels

Direct connectionPriority #1

Point-to-point connection, all data is transferred directly from Computer 1 to Computer 2 without intermediaries. The fastest connection option available.

QUICPriority #2

Alleviates some of the issues with NAT by circumventing it. Encapsulation effectively allows the protocol to establish a UDP tunnel through NAT, making it possible to create and maintain a connection.ter.

UDPPriority #3

Point-to-point connection, all data is transferred directly from Computer 1 to Computer 2. Less stability compared to the direct option, but with the added possibility to bypass restrictions when direct communication via TSP is not possible.

RDPPriority #4

Point-to-point connection, all data is transferred directly between Computer 1 and Computer 2 through the Microsoft RDP channel.

RedirectPriority #5

Allows you to connect any pair of nodes with Internet access, but has the lowest bandwidth, since the data is transmitted through a repeater. This is the only connection type to send device data through our server.

Private Server: Keep Your Data on Your Side

The only case when data from a device goes through our servers is when the redirection connection option is chosen. If you only want your data go through your servers, you can subscribe to the Enterprise plan, and we'll either deploy your own Private Tunnel Server for you, or you can opt to deploy it on a server you already own.

Another advantage to deploying a dedicated proxy in your desired location is that the speed of data transmission will be improved.

Learn more
alt
  • Last updated: 3 June, 2024
  • Demo period: 30 days
  • Available for:
  • 10.76MB Size.
  • Version 7.0.15125. (3 Jun, 2024).
  • Pricing starts $14 per month billed annually
Connect to USB over Ethernet with one click