IXT, a full MVNO focused on secure IoT connectivity, has announced the integration of Zscaler Zero Trust Network Access (ZTNA) into its cellular platform in collaboration with Shift Security. With this move, the company enables enterprises to enforce Zero Trust security policies directly at the SIM level, eliminating the need for traditional VPN infrastructure or endpoint-based software agents.
The integration is built into the IXT SecureNet platform, where all device traffic is routed through the Zscaler Zero Trust Exchange™ platform. Consequently, the system inspects and enforces policies on traffic before it reaches its destination. In addition, the solution removes exposed ports and blocks inbound connections, which significantly reduces the overall attack surface for IoT and OT environments.
IXT operates its own core network across more than 600 mobile networks spanning over 190 countries. Therefore, by embedding ZTNA directly into its infrastructure, the company allows enterprises to achieve consistent Zero Trust enforcement across cellular-connected devices using a single SIM and a unified provider. This streamlined approach simplifies security management while improving global scalability.
However, the need for this innovation stems from a long-standing issue. Most enterprises still rely on VPNs to secure remote access to operational technology systems. While VPNs were once effective, they grant broad network access to any authenticated user. As a result, compromised credentials or devices can expose entire networks. Furthermore, organizations face growing challenges such as VPN sprawl, complex credential management, and increased risk exposure across distributed device fleets.
At the same time, regulatory pressure continues to rise. The EU NIS2 Directive, now being implemented across member states, places strict cybersecurity obligations on organizations managing critical infrastructure. Notably, accountability extends beyond IT teams to senior leadership, who now face direct responsibility for ensuring compliance and managing cyber risk.
To address these challenges, IXT and Zscaler have introduced a solution centered on Zero Trust enforcement at the SIM level. First, the platform ensures that all device traffic flows through the Zero Trust Exchange, removing the need for VPN tunnels and eliminating exposed network entry points. Next, it enables Privileged Remote Access, allowing technicians and third-party contractors to securely access specific systems through a browser-based portal. These sessions are time-bound and fully recorded, ensuring both control and auditability.
Moreover, the platform incorporates dynamic firewall inspection, which continuously evaluates traffic at the network edge and applies real-time security policies regardless of device location. In addition, malware detection and sandboxing capabilities scan file transfers and isolate suspicious content before it can impact operational systems. Together, these features create a comprehensive and proactive security framework.
Henning Solberg, CTO and Co-Founder, IXT, highlights that:
VPNs were designed to connect users on laptops to corporate networks. They were never built for thousands of headless devices in energy grids, water treatment plants and factory floors. With this integration, we bring the same Zero Trust architecture that Zscaler delivers to Fortune 500 IT environments directly to OT and IoT devices over cellular. For organisations facing NIS2 compliance obligations, this integration is designed to support key requirements with a reduced attach surface, no VPN dependencies, full traffic inspection, and audit-ready controls, all from a single SIM.
Marius Holmsen, CTO, Shift Security states:
In most IoT environments, devices are connected, but not really controlled. This integration allows organizations to define exactly what each device is allowed to communicate with, and enforce that consistently across the network with full visibility.
Importantly, the solution is designed for industries with strict regulatory and security requirements. Sectors such as energy, utilities, water management, manufacturing, and transport infrastructure can benefit significantly from this approach. These industries often rely on third-party access to operational systems, which introduces additional risk.
Therefore, the platform’s Privileged Remote Access capability becomes particularly valuable. Instead of distributing VPN clients to contractors, organizations can grant controlled, time-limited access through a secure web portal. This not only enhances security but also simplifies access management while ensuring full session visibility.
Overall, the IXT and Zscaler integration represents a major step forward in securing IoT and OT environments. By replacing legacy VPN models with SIM-level Zero Trust enforcement, organizations can achieve stronger security, improved compliance, and greater operational efficiency in an increasingly connected world.
Recommended Cyber Technology News:
- Bell Integration Adopts NiCE CXone to Transform AI-Driven Customer Operations
- AuxoAI Partners with Google Cloud to Accelerate Enterprise AI Transformation
- Online Services Company Hit by Cyberattack, Services Disrupted
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading





