Does the FCC ruling mean Loxada can no longer supply devices to US customers?
No. Our current device models were FCC-authorized before the March 2026 ruling and can continue to be sold and deployed. The ruling blocks new foreign-made...
No. Our current device models were FCC-authorized before the March 2026 ruling and can continue to be sold and deployed. The ruling blocks new foreign-made...
Loxada’s firmware is currently developed and maintained by engineers based in the UK and United States. By Q4 2026, firmware development for US customers will...
The FCC determination was specifically concerned with manufacturer firmware, supply chain provenance, and the risk of persistent access via compromised router software. Loxada’s architecture directly...
Yes. Loxada’s architecture was designed from the start to be hardware-agnostic, supporting over 200 device models across multiple manufacturers. We are not dependent on any...
Not in a way that disrupts your current deployment. All Loxada devices in use were FCC-authorized before the March 2026 ruling came into effect. Existing...
Many off the shelf routers are insecure as they are supplied with weak default passwords, outdated or insecure firmware, and a general lack of robust...
Yes, most VPN services work across a range of devices, including laptops, smartphones, and tablets. Loxada’s secure routers simplify this by protecting all devices connected...
A VPN significantly reduces the risk of tracking by encrypting your data and masking your IP address. However, determined entities, such as your internet service...
Many consumer-grade routers are not secure by default and may not receive regular updates. Auditing and using managed routers like Loxada ensures that your team’s...
Loxada integrates seamlessly with Secure Access Service Edge (SASE) architectures, adding secure network connectivity for edge devices and complementing your existing framework.
Citrix desktops provide secure application access, but they don’t address network security. Loxada ensures that connections to Citrix are protected from interception or tampering.
Zero trust relies on verifying users, devices, and networks. Loxada complements zero trust by ensuring that the network aspect of your architecture is secure and...