Nexly is the AI partner that builds, investigates, cyber-checks, and reasons across your routers, switches, firewalls, and cloud networks — and waits for your approval before touching production. The first platform built around Network as a Chat: talk to your network from any channel — web, email, WhatsApp, Telegram — and it talks back.
For thirty years, networks have been operated through CLIs, ticket queues, and dashboards that nobody opens. Network as a Chat flips the model: you describe what you want, in plain language, in whatever channel you already live in — and the network responds.
Switch from a Telegram thread to the web portal mid-investigation. Nexly remembers the context.
Approve from your phone. Diff configs over coffee. Walk away — Nexly waits.
Audit, role enforcement, and approval gates apply identically across web, email, WhatsApp, and Telegram.
Nexly is the AI partner across your entire network lifecycle. Day 0 — design the topology and generate configs. Day 2 — investigate issues, propose fixes, and execute under your control. Every change passes through a hard human-in-the-loop gate.
Architect and generate. AI from blank slate to deployable configs.
Describe intent, constraints, and scale. The AI partner proposes topology, addressing, routing strategy, and security policy — with rationale.
The design becomes per-vendor configs. Cisco, Aruba, Arista, Palo Alto — each box gets the right syntax. Staged for review before push.
Investigate, propose, approve, execute. Human-gated, fully audited.
Live-state tools — routing, BGP, interfaces, ACLs, VPN tunnels — feed structured data, not blind shell output. Nexly diagnoses with evidence.
Proposed changes wait for explicit operator approval. Full diff. Full audit trail. Tokenized, time-bound. No silent automation.
Per-vendor configure tools apply the change atomically. Verified post-execution. Rollback path always available.
A growing library of structured tools — not opaque AI guesswork. Each tool maps to a real operator workflow and produces parsed, verifiable output.
Routing tables, BGP/OSPF state, interface counters, ACL hit counts, VPN tunnel status — parsed and reasoned over.
Tenant-isolated data, per-tenant credit pools, role-based access. Built for MSPs from the first commit.
Every config change requires operator approval. Tokenized, time-bound, fully audited.
Single-binary daemon. Outbound WSS only. Credentials encrypted on disk. Zero attack surface.
Every query, every tool call, every approval, every change — logged with operator identity and timestamp.
Routing analysis, security review, config intelligence, device health — initiated by you, charged per scan.
CVE matching against vendor PSIRT and NVD. Hardening checks across config and posture. NIST 800-53 mapping. PDF report per scan.
Active port and service probing, rate-limited and scoped. Findings ranked by severity, mapped to remediation plays.
Demo Nexly against your topology. We'll bring the AI. You bring the routers.