About ZKX Solutions
ZKX Solutions is a U.S.-based technology company that has developed new patent-pending authentication software built on a foundation of Zero Knowledge Proofs. Our software is an iterative, trust-building platform designed to bring next-gen multi-factor authentication (MFA) to networks of any kind, from tactical DIL environments to zero-trust, cloud-based enterprises.
About ZKX MFA Software
The ZKX MFA engine handles simultaneous user and device authentication, making our technology a direct replacement or supplement for existing authentication platforms. Our software is completely agnostic to the devices, network, transport, and storage mechanisms you have in place, and is adaptable to any policy. This makes it incredibly easy to deploy the ZKX engine into your network.
The key benefits of the ZKX platform
Fully Interoperable
Compatible with any network, from the tactical edge to the enterprise​Adaptable to Any Policy
Customizable to fit different trust scores, organizational policies, or strategic doctrineNo Stored Secrets
User information is never disclosed to the authenticating serverPartner with ZKX
Interested in deploying ZKX technology in your network? Or would you like to test our software in your lab? We make it easy to get started. Just fill out this form and let us know how we can help.
What’s new from the ZKX team

National Cybersecurity Strategy Pillar Two: Disrupt and dismantle threat actors
May 2, 2023
They key to mitigating cybercrimes is disrupting and dismantling the actors perpetrating such offenses. The next great fight is set to take part in the cyber domain. The goal is to disrupt these attacks and the entities initiating them before they can even get started. With the increase of federal resources allocated to this initiative, we have proven successful in frustrating threat efforts by malicious actors, foreign governments, and criminals.
Read the Post
National Cybersecurity Strategy Pillar One: Defend Critical InfrastructureÂ
April 21, 2023
Protection of these critical infrastructure assets — such as emergency services, government facilities, energy, nuclear plants, and transportation — is necessary for national security, public safety, and economic growth. The first step is having those with critical infrastructure equipped with the right cybersecurity resources to secure networks and disrupt threat actors without sacrificing the user experience.Â
Read the Post
The Password is Dead; Long Live the Password
March 20, 2023
The password gets a bad rap. Sure – most of it might be warranted, but the password is simply guilty by association. The true culprit of the weak security threshold passwords are perceived to have is the insufficient technological process that underlies traditional password-based authentication – the insecure symmetric method of the classic password.
Read the Post