Tailscale: The Mesh-VPN Market Leader for Private Cloud Access
Mesh VPNs are replacing the old concentrator model. Anyone stepping into this space cannot avoid one name: Tailscale. The service has been the UX gold standard

Classic SSL VPNs are aging. The last two years have shown multiple critical vulnerabilities in the major concentrator products, while at the same time the regulatory pressure from NIS2, DORA and the ongoing Schrems II discussion keeps growing. If you are thinking about remote access into your own private cloud today, you are not just thinking about security anymore. You are also thinking about sovereignty: Where does the vendor sit, who controls the control plane, and what happens with your connection metadata?
This is exactly the gap that NetBird moves into: A Berlin-based open-source project under a BSD-3 license that combines a WireGuard mesh with Zero Trust Network Access and positions itself explicitly as a European alternative to US mesh services. We have spent the last weeks evaluating NetBird as a replacement for traditional VPN access in our own lab environment. This post summarizes what convinced us and where we took a closer look.
As of May 2026, we looked at NetBird Cloud and the current Self-Hosted version.
Three developments are converging right now:
Regulation: NIS2 is being rolled out, DORA forces financial-services firms into strict oversight of their critical ICT suppliers, and data protection authorities are paying closer attention to who can access connection metadata, and when.
Vendor sovereignty: The US CLOUD Act is still on everyone's mind, and more and more organizations want to run their security infrastructure under European law.
Technical debt: The classic concentrator approach with a central gateway through which all traffic is funneled no longer fits a world of distributed workloads, edge sites, and hybrid clouds.
"A VPN gateway that every employee needs in order to reach internal systems is less of a defensive wall today, and more of a single point of failure with mandatory attendance."
Mesh VPNs invert this logic: Every client builds direct, encrypted connections to every other authorized client. The only things that stay central are identity, policy, and key distribution. That is exactly the model NetBird is built on.
NetBird is a WireGuard-based peer-to-peer overlay with a central management plane. No concentrator, no tunnel-in-tunnel construction, but a flat overlay in which every node can reach every other node directly, as long as the policies allow it.
Three properties stand out:
That is not marketing garnish. It is a concrete property that increasingly shows up in vendor assessments under NIS2 and DORA.
Even without a diagram, the architecture fits into five bullet points:
The actual traffic typically does not pass through the management plane. Even when you use NetBird Cloud, the vendor sees control information, but not payload data.
This is where it gets interesting for many companies. NetBird is one of the few products in this segment where self-hosting is not a watered-down side product. All components of the cloud version are available as open source and can be run on your own infrastructure.
What you need:
jq tool.When it comes to IdPs, you have real freedom of choice:
| Category | Options |
|---|---|
| Self-hosted | Zitadel, Keycloak, Authentik, PocketID |
| Managed | Microsoft Entra ID, Google Workspace, Okta, Auth0, JumpCloud |
The combination NetBird + Zitadel is particularly attractive from an EU perspective: Both components are developed in Europe, both are open source, and both are fully self-hostable.
The quick start with the bundled Zitadel setup is a single command:
1curl -fsSL https://github.com/netbirdio/netbird/raw/main/infrastructure_files/getting-started-with-zitadel.sh \
2 | bash -s -- --setup-with-zitadel
The script brings up management, signal, relay, dashboard, and an embedded Zitadel as IdP in a Docker Compose environment. For production scenarios, we recommend separating the components and the IdP into independent deployments and placing a reverse proxy (Caddy or Traefik) in front.
Important: We did not find any artificial feature gates in the documentation or the code that would restrict SSO, ACLs, policies, or audit functionality in self-hosted setups. Posture checks and event streaming are technically available as well. If you are comfortable with the operations work, you get functionally the same platform as the cloud offering.
If you do not want to run self-hosting yourself, NetBird is also available as a managed cloud. The tiers (as of May 2026):
| Tier | Price | User limit | Machines | Highlights |
|---|---|---|---|---|
| Free | $0 | up to 5 | 100 | P2P, social SSO, DNS, ACLs, community support |
| Team | $5/user/month | unlimited | 100 + 10/user | Enterprise IdP, SCIM, audit logging, ticket support |
| Business | $10/user/month | unlimited | 100 + 10/user | Device approvals, posture checks, MDM/EDR, event streaming, priority |
| Enterprise | Custom | unlimited | unlimited | On-premises, DORA compliance, SLAs, invoice billing |
Two details that come up regularly in practical discussions:
For a classic SMB with 30 full-time employees that wants access into its own private cloud, the Team tier lands at roughly $150/month. That is significantly below what a comparable concentrator solution typically costs in licenses and hardware alone.
The supported platforms cover the typical enterprise mix: Linux, Windows, macOS, iOS, Android, plus Docker containers and routers. Desktop systems get a GUI, while servers and containers are driven through the CLI.
What we noticed positively during the evaluation:
Where it is still catching up to Tailscale: The mobile clients feel a little less polished in one or two places, and the feature set of the browser admin UI is still growing.
This is the question we put to every vendor with a "Made in EU" sticker. With NetBird, the answers are concrete:
trust.netbird.io).Combined with the free choice of IdP (especially Zitadel, which is also from the German-speaking region), you can build a remote access stack that sits entirely under European control, without losing any functionality. For organizations that are reviewing their supply chain as part of a NIS2 rollout, that is a relevant argument.
Four scenarios where NetBird clearly moves to the front of the field:
NetBird delivers a rare full package here: An EU vendor, BSD-3 source availability, the relevant certifications, and the option to run on-premises. In vendor assessments that is valuable, because you can answer almost every question with "yes, verifiable."
If the goal is secure, identity-based access to your own workloads at Hetzner, IONOS, OVH, an on-premises environment, or a mix of all of these, NetBird is an excellent fit. You can run the entire system on your own EU infrastructure.
The typical concentrator VPN stack (hardware appliance plus client) generates license, maintenance, and operations costs that often exceed what NetBird charges in the Team or Business tier. At the same time, you gain a modern mesh model with Zero Trust baked in.
Up to five users and 100 machines, the cloud tier is simply $0. For a hobbyist setup or a first proof of concept, this is risk-free. If you want to go further, you self-host the platform with Docker Compose and pay only for the VM.
NetBird is our top recommendation in May 2026 when EU sovereignty and full self-hosting freedom are both on the wish list. The product is mature enough for production, the license is permissive, the vendor is based in Berlin, and the pricing model is friendly compared to the market.
Over the next days, two more introductions in this series are coming up: Tailscale as the US market leader with the most polished user experience, and Headscale as the community-driven open-source alternative to the Tailscale control plane. The direct comparison of all three solutions along the axes of self-hosting, private cloud access, license cost, client comfort, and EU-first then follows in a closing fourth post.
If you are currently looking to replace a classic VPN, setting up a NIS2 or DORA program, or building sovereign access into your private cloud, we at Infralovers are happy to support you. We are also glad to advise you around our Sovereign Cloud offering. We bring experience from architecture, migration, and operations, combined with our training portfolio on NIS2 Compliance and Cloud Native Essentials.
You are interested in our courses or you simply have a question that needs answering? You can contact us at anytime! We will do our best to answer all your questions.
Contact us