Technology
Zero Trust X (ZTX) Software Stack
The ZTX software stack enables secure data exchange over untrusted 5G and future-generation networks. Our technology is fully standards-compliant and requires no modifications to network infrastructure.
Key attributes:
- Designed for use in contested and mission-critical environments
- Lightweight software deployment on user equipment (UE)
- Compatible with ORAN and proprietary network architectures
- Transparent to network operators
Key Capabilities
THREAT DETECTION
Our threat monitoring solutions proactively identify threats across various components in the 5G stack. Key features include:
- Passive monitoring of 5G protocol layers
- Independent of cooperation from network providers
- Operates across both legacy and evolving network designs
- Standards-compliant without protocol modification


SHIELDING COMMUNICATIONS
We offer robust secure communication solutions for 5G, safeguarding against various types of attacks:
- Application-layer security with integrated location privacy
- Protection from DDoS, jamming, MITM, and advanced eavesdropping
- Built-in resilience against novel and unknown threats
Deployment and Validation
ZTX technology is being validated using an internal lab-scale 5G testbed. Future phases include integration with commercial testbeds to demonstrate operational relevance and interoperability.
