IXT Zero Trust

No attack surface. No VPNs. Full visibility.

Protect your connected devices with enterprise-grade Zero Trust enforcement. No exposed ports. No VPN clients. No agents on devices. Powered by Zscaler and Illumio. 

Why Zero Trust for IoT?

ALL | Icon | Shield lock

No Attack Surface

No exposed ports. No inbound connections. Device-initiated traffic only. There is nothing to attack.

ALL | Icon | Visibility

Full device visibility

See which devices talk to which endpoints. Get alerted when behavior changes. Works for both smart and simple devices.

ALL | Icon | Browser updated

Third-party access without VPN

Technicians and contractors connect through a browser portal. Time-limited, fully recorded sessions. No VPN clients needed.

ALL | Icon | Verified user

NIS2-ready by design

Segmentation, audit trails, controlled access, and session recording. Built to meet NIS2 requirements from day one.

Key features

iStock-804878182

Zero Trust Network Access (ZTNA)

Powered by Zscaler. All device traffic routes through the Zero Trust Exchange. Every connection is inspected and policy-enforced before reaching its destination. No inbound connections accepted. No ports exposed on your datacenter or cloud.

ALL | Website | Image | CMP Real-time insight

Privileged remote access

Service technicians and third-party contractors access specific equipment through a browser-based portal. SSH, VNC, and RDP sessions run in the browser. Access is time-limited, fully recorded, and supports co-viewing.

ALL | Website | Image | Connectivity | City junction at night

Traffic mapping and anomaly detection

Powered by Illumio. Visual traffic flow mapping for all device communications. See which devices connect to which endpoints. Automatic alerts when a device starts communicating with an unexpected destination.

ALL | Blog | Image | The Truth About IoT Global Coverage and Reliability

Policy-based segmentation

Define communication policies per device type. Control which devices are allowed to communicate with which applications. Reduce the blast radius of any breach by containing incidents automatically.

Includes malware scanning and file sandboxing on every transfer.

Who is IXT Zero Trust for?

IXT Zero Trust is built for industries where connected devices operate in regulated, high-risk, or distributed environments.

ALL | Industrial automation; How Dutch Industry is Tackling Secure IoT Connectivity in 2025

Industrial automation

Protect remote maintenance access to production equipment. Vendors connect through the browser portal instead of VPN, with time-limited sessions and full recording.

ALL | Image | Securenet for security

Security systems

Security cameras and access control devices are network endpoints. Traffic mapping detects unusual behavior. Segmentation stops lateral movement across your security estate.

ALL | Tracking | Coordinated Fleet on Open Highway 5

Tracking & logistics

Location and cargo data crosses borders continuously. Zero Trust enforcement ensures compromised devices get no path into your backend systems.

ALL | Industry | EV charging industrial 5

EV charging

Segmentation separates payment processing from grid communication. Remote access through the browser portal replaces VPN for distributed charging stations.

How Zero Trust works

Connect through IXT

Your IoT devices connect through the IXT private network. Traffic stays off the public internet from the start.

Enforce Zero Trust policies

All traffic routes through the Zscaler Zero Trust Exchange. Every connection is verified. No ports exposed. No inbound connections.

Map device behavior

IXT Zero Trust Segmentation captures and maps all traffic flows. See every connection. Get alerted when behavior deviates from the baseline.

Control access and respond

Grant third-party access through the browser portal. Define policies per device type. Contain incidents automatically through segmentation.

Frequently asked questions

One Sim.

Global Reach.

``