Post Type Name

Explainer

Filter by Category:

ZKX Helix: Explainer Animation

With Helix, you immediately minimize your network’s attack surfaces and protect individual resources with surgical precision. Helix’s patented technology effortlessly verifies user and device identities with confidence, enabling the adoption of strong security frameworks like zero-trust. This explainer animation highlights how ZKX Helix makes cybersecurity work for you.

How ZKX Technology Works

In this quick video, Chief Technology Officer, Collin Sweeney gives a brief introduction to how ZKX’s patented technology works.

Long Live the Password

Every few years, society advocates for the retirement of some technology thought to be no longer sufficient. This generation chooses to attack the password for perceived security risks. At ZKX, we make the argument that the password is not the problem; the technology behind it is. Our technologies seek to make cybersecurity a responsibility left […]

Man in the Middle Attacks Explained

In this short video, ZKX Software Engineer Emerald Rafferty explains what a “man in the middle” attack is, gives us a theoretical and a real-world example of where this may occur, and explains how ZKX technology mitigates this type of cyber attack, keeping the user, and their device safe from cyber adversaries.

Constructing your Cybersecurity Posture

Here at ZKX Solutions, prospective customers or business partners often ask us how we go about structuring a good defensive cyber security posture. In this video, Chief Technology Officer Collin Sweeney discusses the importance of three categories that fully encompass a good defensive cybersecurity posture: policy, technology, and culture. Read the article.

Zero Knowledge Proofs Explained

At ZKX Solutions we often talk about how we employ zero-knowledge proofs to help achieve our zero trust, multi-factor authentication technology. In this video, Chief Technologist Collin Sweeney talks a little bit about what zero knowledge proofs are and why ZKX Solutions chose to employ them in pursuit of actualizing zero trust parameters.

ZKX vs Traditional Authentication

In this 3-minute animated explainer video, we identify the numerous limitations of the “traditional” authentication model used today, and show how ZKX solves all of these problems.