Why site-to-site VPNs don’t work at grid edge scale
Discover why traditional site-to-site VPNs fail at grid-edge scale and how Zero Trust can enhance operational security for smart grids and distributed energy deployments.
Article feed
Why IoT connectivity turns expensive in Dutch industrial automation
Dutch CTOs cut data waste, downtime and SIM admin with IXT’s pooled data and SecureNet.
Utilities at scale: the real cost of moving from pilot to 100k devices
Discover the hidden costs of scaling from pilot to 100k IoT devices and learn strategies to manage expenses and ensure efficiency. Read on to optimize your large-scale deployments.
NIS2 for utilities: a practical connectivity checklist
Effective NIS2 compliance for utilities: A practical checklist to secure and manage connected assets, focusing on identity, access control, monitoring, supply chain, and incident response.
Secure remote O&M without flat networks
Learn how Zero Trust principles can secure remote operations and maintenance by providing just-in-time, per-session access and robust audit trails, reducing risks and improving compliance.
Utilities guide: stop roaming dropouts with multi-IMSI + eUICC
Stop roaming dropouts in cross-border rollouts with multi-IMSI and eUICC. Learn how to improve reliability and uptime in your utility deployments.
Zero Trust for industrial IoT: identity at the SIM, policy in the network
How Smart Cities reduce risk and meet EU rules with Zero-Trust IoT connectivity. See practical steps for street lighting, water, and waste deployments.
Zero Trust for utilities: a better way than site-to-site VPNs
Enhance utility network security with Zero Trust principles. Learn how IXT SecureNet offers precise, per-session access control and robust auditing, replacing fragile site-to-site VPNs.
SIM-layer threats and how to stop them
Learn how to protect mobile networks by securing SIM credentials, enforcing strict policies, and enabling rapid revocation to prevent SIM-layer threats.