Technology

Zero Trust X (ZTX) Software Stack

The ZTX software stack enables secure data exchange over untrusted 5G and future-generation networks. Our technology is fully standards-compliant and requires no modifications to network infrastructure.

Key attributes:

Key Capabilities

THREAT DETECTION

Our threat monitoring solutions proactively identify threats across various components in the 5G stack. Key features include:

  • Passive monitoring of 5G protocol layers
  • Independent of cooperation from network providers
  • Operates across both legacy and evolving network designs
  • Standards-compliant without protocol modification

SHIELDING COMMUNICATIONS

We offer robust secure communication solutions for 5G, safeguarding against various types of attacks:

  • Application-layer security with integrated location privacy
  • Protection from DDoS, jamming, MITM, and advanced eavesdropping
  • Built-in resilience against novel and unknown threats

Deployment and Validation

ZTX technology is being validated using an internal lab-scale 5G testbed. Future phases include integration with commercial testbeds to demonstrate operational relevance and interoperability.