About ZKX Solutions

ZKX Solutions is a U.S.-based technology company that has developed new patent-pending authentication software built on a foundation of Zero Knowledge Proofs. Our software is an iterative, trust-building platform designed to bring next-gen multi-factor authentication (MFA) to networks of any kind, from tactical DIL environments to zero-trust, cloud-based enterprises.

About ZKX MFA Software

The ZKX MFA engine handles simultaneous user and device authentication, making our technology a direct replacement or supplement for existing authentication platforms. Our software is completely agnostic to the devices, network, transport, and storage mechanisms you have in place, and is adaptable to any policy. This makes it incredibly easy to deploy the ZKX engine into your network.

The key benefits of the ZKX platform

Fully Interoperable

Compatible with any network, from the tactical edge to the enterprise​

Adaptable to Any Policy

Customizable to fit different trust scores, organizational policies, or strategic doctrine

No Stored Secrets

User information is never disclosed to the authenticating server

Partner with ZKX

Interested in deploying ZKX technology in your network? Or would you like to test our software in your lab? We make it easy to get started. Just fill out this form and let us know how we can help.

What’s new from the ZKX team

National Cybersecurity Strategy Pillar Two: Disrupt and dismantle threat actors

May 2, 2023

They key to mitigating cybercrimes is disrupting and dismantling the actors perpetrating such offenses. The next great fight is set to take part in the cyber domain. The goal is to disrupt these attacks and the entities initiating them before they can even get started. With the increase of federal resources allocated to this initiative, we have proven successful in frustrating threat efforts by malicious actors, foreign governments, and criminals.

Read the Post

National Cybersecurity Strategy Pillar One: Defend Critical Infrastructure 

April 21, 2023

Protection of these critical infrastructure assets — such as emergency services, government facilities, energy, nuclear plants, and transportation — is necessary for national security, public safety, and economic growth. The first step is having those with critical infrastructure equipped with the right cybersecurity resources to secure networks and disrupt threat actors without sacrificing the user experience. 

Read the Post

The Password is Dead; Long Live the Password

March 20, 2023

The password gets a bad rap. Sure – most of it might be warranted, but the password is simply guilty by association. The true culprit of the weak security threshold passwords are perceived to have is the insufficient technological process that underlies traditional password-based authentication – the insecure symmetric method of the classic password.

Read the Post