Ingress for external networks: customer environments

ngrok brings secure ingress for dev/test environments equipping developers to effortlessly test and preview applications and APIs.


Fill out the form to talk to an expert.


Connecting to customer networks is a challenge

Bring Your Own Cloud (BYOC) is an emerging architecture where software is deployed within the customer's environment — to access their data for instance. However, securing network access to a customer's environment can be time-consuming as you have to grapple with VPNs, VPC peering, PrivateLink and firewall configurations, which require extensive security reviews and approvals. This delays time to value and leads to dissatisfaction and churn.


Hassle-free connectivity to customer networks

Deploy BYOC architectures in a frictionless manner by quickly securing access to customer networks without requiring any changes to network configurations.  


  • Embed ngrok with your solution and get instant connectivity with your customers
  • Reach customers networks without inbound ports, site-to-site VPNs, or change requests
  • Connect to customers at scale by eliminating bespoke configurations

Bring Your Own Cloud (BYOC)

Watch the video to learn more about this emerging architecture where software is deployed within the customer's environment.

Accelerate customer deployments

Unblock BYOC implementations

Deploy your BYOC architecture in just a few hours. Minimize review cycles with customer’s IT teams and achieve scale across your customer base.

Reduce time to value from months to days

Enable customers to quickly realize the benefits of your solution and ensure high CSAT.

Shorten sales cycles and increase win rates 

Close deals faster and achieve higher win rates by speeding up Proof of Concepts.

Robust security and controls

Enforce policies

Apply policies such as mTLS, IP restrictions, OAuth/SAML/OIDC to your data plane deployed in customer’s network.

Private edition

Deploy a dedicated instance of ngrok in your own environment for added security.

Secure outbound traffic

Allow only authorized traffic from your customer’s environment to your network by using dedicated IP addresses and fully white labeled non-ngrok URLs for your data plane.