v1.1 — Network as a Chat, in production soon

Autonomous network
operations, AI-first.

Nexly is the AI partner that builds, investigates, cyber-checks, and reasons across your routers, switches, firewalls, and cloud networks — and waits for your approval before touching production. The first platform built around Network as a Chat: talk to your network from any channel — web, email, WhatsApp, Telegram — and it talks back.

runtime production uptime 99.1% target approval human-in-the-loop
Speaks to your gear, natively
Live
Cisco IOS / IOS-XE Cisco Meraki Palo Alto Networks Aruba Switches Aruba Wireless Arista Switches Oracle Cloud (OCI)
Coming
FortiGate Microsoft Azure Cisco SD-WAN Cisco ACI Cisco NDO Cisco Wireless Juniper Switches Juniper Routers
A new category

Network
as a Chat

For thirty years, networks have been operated through CLIs, ticket queues, and dashboards that nobody opens. Network as a Chat flips the model: you describe what you want, in plain language, in whatever channel you already live in — and the network responds.

01
One conversation, every channel.

Switch from a Telegram thread to the web portal mid-investigation. Nexly remembers the context.

02
Designed for human pace, not bot pace.

Approve from your phone. Diff configs over coffee. Walk away — Nexly waits.

03
Channels are operator-grade, not gimmicks.

Audit, role enforcement, and approval gates apply identically across web, email, WhatsApp, and Telegram.

Operator channels
Web portal Live
app.nexlynetworks.com · full UI, dashboards, audit
Telegram Live
@nexly_bot · ChatOps for engineers on call
Email Live
ops@yourdomain · investigate from your inbox
WhatsApp Coming
via WhatsApp Business Cloud API
Slack Coming
slash commands, threaded approvals
One identity. One audit log. One credit pool. Every channel.
How it works

From greenfield design
to live operations.

Nexly is the AI partner across your entire network lifecycle. Day 0 — design the topology and generate configs. Day 2 — investigate issues, propose fixes, and execute under your control. Every change passes through a hard human-in-the-loop gate.

Day 0

Build

Architect and generate. AI from blank slate to deployable configs.

01

Design

Describe intent, constraints, and scale. The AI partner proposes topology, addressing, routing strategy, and security policy — with rationale.

02

Implement

The design becomes per-vendor configs. Cisco, Aruba, Arista, Palo Alto — each box gets the right syntax. Staged for review before push.

Day 2

Operate

Investigate, propose, approve, execute. Human-gated, fully audited.

03

Reason

Live-state tools — routing, BGP, interfaces, ACLs, VPN tunnels — feed structured data, not blind shell output. Nexly diagnoses with evidence.

04

Approve

Proposed changes wait for explicit operator approval. Full diff. Full audit trail. Tokenized, time-bound. No silent automation.

05

Execute

Per-vendor configure tools apply the change atomically. Verified post-execution. Rollback path always available.

Capabilities

Everything an operator does, formalized.

A growing library of structured tools — not opaque AI guesswork. Each tool maps to a real operator workflow and produces parsed, verifiable output.

Live network diagnostics

Routing tables, BGP/OSPF state, interface counters, ACL hit counts, VPN tunnel status — parsed and reasoned over.

Multi-tenant by design

Tenant-isolated data, per-tenant credit pools, role-based access. Built for MSPs from the first commit.

Approval-gated execution

Every config change requires operator approval. Tokenized, time-bound, fully audited.

On-prem connector

Single-binary daemon. Outbound WSS only. Credentials encrypted on disk. Zero attack surface.

Full audit trail

Every query, every tool call, every approval, every change — logged with operator identity and timestamp.

AI insights, on demand

Routing analysis, security review, config intelligence, device health — initiated by you, charged per scan.

Vulnerability scan

CVE matching against vendor PSIRT and NVD. Hardening checks across config and posture. NIST 800-53 mapping. PDF report per scan.

Penetration test Coming

Active port and service probing, rate-limited and scoped. Findings ranked by severity, mapped to remediation plays.

By the numbers

Built for the work, not the demo.

35+
live network tools
22
cloud diagnostics
3
cloud providers (live)
100%
approval-gated writes

See your network reason for itself.

Demo Nexly against your topology. We'll bring the AI. You bring the routers.