SD-WAN for Small Business

Unleash optimum performance and reliability for your Internet. Bond multiple WANs together to enhance Internet cloud access for SaaS, VoIP, video and all your other applications.

Set your network on autopilot with enterprise grade turnkey SD-WAN with a low total cost of ownership.

Networks on Autopilot

Broadband Bonding

A single Internet line may not be reliable enough or fast enough for your growing bandwidth needs. With Mushroom’s Broadband Bonding, you can aggregate/bond together any Internet connection, from any ISP, anywhere in the world, for bonded Internet speed and improved application performance and reliability.

Advanced Routing, Security and QoS

Mushroom’s network appliances are multi-WAN stateful firewalls with advanced routing and Quality of Service capabilities built-in. It manages your WAN links efficiently with dynamic traffic shaping and bandwidth reservations to carve out bandwidth for the applications that matter to your business.

Mushroom devices install transparently in pass-through between your existing network and existing modems. You can either replace your firewall with the Mushroom appliance or if you prefer, you can keep your existing firewall intact.

VOIP / SIP Performance

VoIP done the old way

Significant cost savings and agility is possible if you are hosting your own IP-PBX, or if you are leveraging a hosted IP-PBX telephone service with cost effective SIP trunks. However, VoIP/SIP traffic and voice quality are prone to high latency, packet loss and jitter. ISP last mile problems, ISP core network congestion, or your own cross traffic can cause your VoIP service to suffer.

VoIP done the correct way

Mushroom appliances are equipped to connect to Mushroom’s worldwide Cloud based Relays to create a secure, encrypted multi-path (multi-WAN) VoIP Armor tunnel from your Mushroom device into the Mushroom Cloud Relays. The VoIP Armor tunnel monitors paths in real-time and steer VoIP/SIP packets around and away from network problems instantly, to keep your VoIP flows healthy and MOS score high.

Leveraging Cloud Relays

VoIP Armor not only optimizes your last mile for your VoIP/SIP flows by leveraging the multi-path real-time packet steering, but it accomplishes this without dropping any of your on-going calls – even during WAN disconnects. Since Mushroom Cloud Relays have non-changing elastic static IP addresses, your cloud PBX provider, as well as your office phones will be 100% shielded from network problems.

Cloud Performance

Public Clouds - SaaS

Your organization may be using applications such as CRM, ERP, email, UC (Unified Communications), file transfer/storage and countless others that are delivered as SaaS (Software-as-a-Service) over the WAN. Mushroom’s application specific overlay tunnels optimize your WAN and application performance, so that your team’s SaaS experience is flawless.

Private Clouds

Performance of the connectivity to your physical data-center cabinet is critically important if you are hosting applications and services in your private cloud. Your office’s WAN performance will determine how well your applications perform, especially for latency and bandwidth sensitive applications. Mushroom’s overlay tunnels create high performance IP connectivity to your data center for optimum performance.

Virtual Private Clouds - IaaS

Some of your applications may be hosted in off-premise Virtual Private Clouds. IaaS (Infrastructure-as-a-Service) hosted in Amazon, Microsoft or Google Clouds heavily rely on the performance of the office WAN. Mushroom’s SD-WAN technology ensures optimum end-user experience for these virtual private cloud use cases by intelligently orchestrating your WAN links.

Traffic Management

Mushroom’s advanced yet flexible routing capabilities provide pinpoint granularity to route flows over desired paths. Tunnels and WAN links can be logically grouped into Virtual interfaces with load balancing and fail-over policies, working hand-in-hand with the advanced QoS (Quality of Service) capabilities that precisely fit your business requirements.


Mushroom’s physical and virtual appliances are hardened and secured with the built-in firewall. The base firewall capabilities are included with every Mushroom appliance. Ongoing firmware updates ensure new security patches are applied to protect your network. With the optional Cloud Relay Service, Mushroom appliances connect to the Mushroom operated Cloud Relays with the multi-path overlay tunnels support AES-128 and AES-256 encryption to protect against eavesdropping, tampering and message forgery and leverage TLS 1.2 with SRP (Secure Remote Password) protocol authentication with protection against dictionary attacks. Cloud Relays are based on a secure network architecture with strict traffic flow policies. Comprehensive monitoring of inbound and outbound communications is done to detect threats such as Denial of Service (DoS), Distributed Denial Of Service (DDoS), flooding, software/logic attacks, Man in the Middle (MITM) attacks, IP spoofing, port scanning and packet sniffing. Additionally, redundant telecommunication providers as well as additional capacity protect against the possibility of DoS attacks.

Additional Security Functions

Cloud delivered Next Generation Firewall (NGFW) and Unified Threat Management (UTM) services are available as VNF (Virtual Network Function) services that can be service-chained to your Mushroom Cloud Relay. Every workflow is moving to the cloud and so should your security perimeter in order to improve your security posture. Since your security infrastructure is managed by us in the cloud, there is nothing to update or upgrade. With Mushroom’s cloud delivered NGFW and UTM services, all the work is done in the cloud for you. Your office is connected to your Mushroom Cloud Relays with the secure encrypted tunnel and the security functions are delivered to you from the cloud. The Core Security Suite and Advanced Security Suites described below are available as additional add-ons.

Core Security Suite

Intrusion Prevention

IPS (Intrusion Prevention System) inspects your packets in real-time to identify known threats and malicious activities including SQL injection, spyware, buffer overflows and cross-site scripting from an hourly updated database of new threat signatures.

Reputation based Threat Mitigation

Botnets and bad reputation URLs that are on various reputation lists that are dynamically updated on an on-going basis are instantly blocked, before they can become a threat to your network.

Web Content Filtering

With more than 100 types of content groups for http and https, allow or restrict URLs to block unwanted traffic in the cloud before it reaches your local network.

Gateway AntiVirus

Protects against known viruses, trojans, spyware, rogueware and worms with multi-layered signature-based and behavioral-based scanning. The signature set is dynamically updated and it leverages Machine Learning models.

Complete Security Suite Adds

Persistent Threat Blocker

Provides cloud based sandboxing of advanced persistent threats such as ransomware, zero-day threats and evolving malware that are designed to bypass traditional network security.

Data Loss Prevention

Protects confidential data transmission over email, web and FTP for over 30 file types with the built-in library of over 200 rules and compliance mandates such as PCI DSS and HIPAA and others for 18 countries.

Network Mapping

Detect all unauthorized hosts connected to your network with information such as OS version, open ports and protocols.

DNS Inspector

Scans DNS requests and filters against a list of known malicious DNS Sites. If the site is malicious, blocks access and warns user.

Application Control

Ability to block, allow or restrict over 1,700 applications with granular policies such as bandwidth throttles and per user/group/schedule policies in the cloud before it reaches your local network.


State of the art real-time protection against spam and phishing attempts.

Intelligent AntiVirus

Protects against evolving zero day malware without requiring signatures but instead leverages Machine Learning based algorithms.

Threat Detect & Respond

Advanced algorithms correlate network and endpoint security events to detect and stop malware attacks.

Testimonials & Awards

“Just drop the Truffle into your network and experience what it is like to have a large bandwidth pipe at a fraction of the cost. The Truffle is highly reliable, scalable and easy to use.”


Vice President of IT
Pacific Capital Group

“This is hands down the best hardware investment I have made. The Truffle has been a real life saver.”

Michael Durdin

Technology Coordinator
East Wake Academy

“I have to say, these devices [Broadband Bonding devices] are pretty incredible. These things really are as easy to understand and configure as you described.  I’m very impressed.”

Dorian DeLuca

IT Manager
Michael Brady

Clients include:

Let's chat

We respect your privacy.

© 2004 – 2022 Mushroom Networks Inc. All rights reserved.

Let’s chat. Call us at +1 (858) 452-1031 or fill the form:

Get your WAN Cheat Sheet

Download your copy of rare tips and tricks for a better WAN. Get your free copy today!

We respect your privacy.