IXT Zero Trust
No attack surface. No VPNs. Full visibility.
Protect your connected devices with enterprise-grade Zero Trust enforcement. No exposed ports. No VPN clients. No agents on devices. Powered by Zscaler and Illumio.
Why Zero Trust for IoT?
No Attack Surface
No exposed ports. No inbound connections. Device-initiated traffic only. There is nothing to attack.
Full device visibility
See which devices talk to which endpoints. Get alerted when behavior changes. Works for both smart and simple devices.
Third-party access without VPN
Technicians and contractors connect through a browser portal. Time-limited, fully recorded sessions. No VPN clients needed.
NIS2-ready by design
Segmentation, audit trails, controlled access, and session recording. Built to meet NIS2 requirements from day one.
Key features
Zero Trust Network Access (ZTNA)
Powered by Zscaler. All device traffic routes through the Zero Trust Exchange. Every connection is inspected and policy-enforced before reaching its destination. No inbound connections accepted. No ports exposed on your datacenter or cloud.
Privileged remote access
Service technicians and third-party contractors access specific equipment through a browser-based portal. SSH, VNC, and RDP sessions run in the browser. Access is time-limited, fully recorded, and supports co-viewing.
Traffic mapping and anomaly detection
Powered by Illumio. Visual traffic flow mapping for all device communications. See which devices connect to which endpoints. Automatic alerts when a device starts communicating with an unexpected destination.
Policy-based segmentation
Define communication policies per device type. Control which devices are allowed to communicate with which applications. Reduce the blast radius of any breach by containing incidents automatically.
Includes malware scanning and file sandboxing on every transfer.
Who is IXT Zero Trust for?
IXT Zero Trust is built for industries where connected devices operate in regulated, high-risk, or distributed environments.
Industrial automation
Protect remote maintenance access to production equipment. Vendors connect through the browser portal instead of VPN, with time-limited sessions and full recording.
Security systems
Security cameras and access control devices are network endpoints. Traffic mapping detects unusual behavior. Segmentation stops lateral movement across your security estate.
Tracking & logistics
Location and cargo data crosses borders continuously. Zero Trust enforcement ensures compromised devices get no path into your backend systems.
EV charging
Segmentation separates payment processing from grid communication. Remote access through the browser portal replaces VPN for distributed charging stations.
How Zero Trust works
Connect through IXT
Your IoT devices connect through the IXT private network. Traffic stays off the public internet from the start.
Enforce Zero Trust policies
All traffic routes through the Zscaler Zero Trust Exchange. Every connection is verified. No ports exposed. No inbound connections.
Map device behavior
IXT Zero Trust Segmentation captures and maps all traffic flows. See every connection. Get alerted when behavior deviates from the baseline.
Control access and respond
Grant third-party access through the browser portal. Define policies per device type. Contain incidents automatically through segmentation.
Frequently asked questions
IXT Zero Trust combines two integrated components: Zero Trust Connectivity powered by Zscaler ZTNA, and Zero Trust Segmentation powered by Illumio. Together, they eliminate the attack surface on your IoT and OT devices, replace VPN dependencies, and give you full visibility into device behavior. All traffic is verified, inspected, and policy-enforced before reaching your infrastructure. No ports are exposed. No inbound connections are accepted.
Yes. IXT Zero Trust is available as an add-on to IXT SecureNet, which provides the private networking foundation. SecureNet routes your IoT traffic through isolated, private networks. Zero Trust adds enforcement, inspection, traffic mapping, and third-party access control on top of that foundation.
VPNs extend full network access to anyone who connects. A contractor with a compromised laptop gets the same broad access as your internal systems. At scale, this creates VPN sprawl, credential overhead, and expanding exposure. IXT Zero Trust eliminates VPN dependencies entirely. Devices initiate traffic outbound. No ports are exposed. Third-party access runs through a browser-based portal with time-limited, recorded sessions. Access is granted to specific applications, not to your network.
Yes. IXT Zero Trust protects both intelligent and unintelligent endpoints. Security is enforced at the network and SIM level, not on the device itself. No client software or agents need to run on the device. This makes it suitable for simple sensors, meters, and legacy equipment alongside smart connected devices.
The EU NIS2 Directive requires organizations operating critical infrastructure to secure all network connectivity, including IoT and OT. IXT Zero Trust provides network segmentation, controlled access with audit trails, anomaly detection, and session recording for third-party access. These capabilities map directly to NIS2 requirements. Board members and senior management carry personal accountability for compliance, making built-in security a governance priority.