IXT Zero Trust
No attack surface. No VPNs. Full visibility.
Protect your connected devices with enterprise-grade Zero Trust enforcement. No exposed ports. No VPN clients. No agents on devices. Powered by Zscaler and Illumio.
Why Zero Trust for IoT?
No Attack Surface
No exposed ports. No inbound connections. Device-initiated traffic only. There is nothing to attack.
Full device visibility
See which devices talk to which endpoints. Get alerted when behavior changes. Works for both smart and simple devices.
Third-party access without VPN
Technicians and contractors connect through a browser portal. Time-limited, fully recorded sessions. No VPN clients needed.
NIS2-ready by design
Segmentation, audit trails, controlled access, and session recording. Built to meet NIS2 requirements from day one.
Key features
Zero Trust Network Access (ZTNA)
Your infrastructure stays invisible to the outside world. Devices connect out. Nothing connects in. Powered by Zscaler. All device traffic routes through the Zero Trust Exchange. Every connection is inspected and policy-enforced before reaching its destination. No inbound connections accepted. No ports exposed on your datacenter or cloud.
Privileged remote access
Service technicians and third-party contractors access specific equipment through a browser-based portal. SSH, VNC, and RDP sessions run in the browser. Access is time-limited, fully recorded, and supports co-viewing.
Traffic mapping and anomaly detection
Powered by Illumio. Visual traffic flow mapping for all device communications. See which devices connect to which endpoints. Automatic alerts when a device starts communicating with an unexpected destination.
Policy-based segmentation
Define communication policies per device type. Control which devices are allowed to communicate with which applications. Reduce the blast radius of any breach by containing incidents automatically.
Includes malware scanning and file sandboxing on every transfer.
Who is IXT Zero Trust for?
IXT Zero Trust is built for industries where connected devices operate in regulated, high-risk, or distributed environments.
Industrial automation
Vendors need access to your machines. VPN gives them your whole network. Browser-based access gives them only what they need, for only as long as they need it.
Security systems
The device that's supposed to protect you can become the entry point. Traffic mapping detects unusual behavior before it becomes an incident.
Tracking & logistics
Location and cargo data crosses borders continuously. Zero Trust enforcement ensures compromised devices get no path into your backend systems.
EV charging
Payment processing and grid communication on the same network is an exposure risk. Segmentation keeps them separate by design.
Frequently asked questions
IXT Zero Trust combines two integrated components: Zero Trust Connectivity powered by Zscaler ZTNA, and Zero Trust Visualisation powered by Illumio. Together, they eliminate the attack surface on your IoT and OT devices, replace VPN dependencies, and give you full visibility into device behavior. All traffic is verified, inspected, and policy-enforced before reaching your infrastructure. No ports are exposed. No inbound connections are accepted.
IXT Zero Trust is IXT's standard security offering. It includes private networking (the SecureNet layer) plus Zero Trust enforcement, traffic visibility, and controlled remote access. Customers who choose not to take Zero Trust can take SecureNet-only as the lighter option. Both run on the same private network infrastructure.
VPNs extend full network access to anyone who connects. A contractor with a compromised laptop gets the same broad access as your internal systems. At scale, this creates VPN sprawl, credential overhead, and expanding exposure. IXT Zero Trust eliminates VPN dependencies entirely. Devices initiate traffic outbound. No ports are exposed. Third-party access runs through a browser-based portal with time-limited, recorded sessions. Access is granted to specific applications, not to your network.
Yes. IXT Zero Trust protects both intelligent and unintelligent endpoints. Security is enforced at the network and SIM level, not on the device itself. No client software or agents need to run on the device. This makes it suitable for simple sensors, meters, and legacy equipment alongside smart connected devices.
The EU NIS2 Directive requires organizations operating critical infrastructure to secure all network connectivity, including IoT and OT. IXT Zero Trust provides network segmentation, controlled access with audit trails, anomaly detection, and session recording for third-party access. These capabilities map directly to NIS2 requirements. Board members and senior management carry personal accountability for compliance, making built-in security a governance priority.