Securing the Network Edge

What is Loxada?

Loxada provides a secure, managed router system that creates a trusted network edge close to your users, wherever they work. We replace off-the-shelf routers with hardened, centrally controlled alternatives that help protect sensitive data when staff connect from networks you don’t own or manage.

Our firmware removes all vendor software, locking down the device entirely. Updates are automated, threats are blocked by default, and every device connects through a secure, always-on VPN tunnel. It’s a simple, scalable way to make remote access safe by design.

Why the Network Edge Is a Risk

Not all routers are equal. And in locations outside your control, you often have no idea what kind of network your users are connecting through. Shared office spaces, client sites, serviced offices, coworking hubs, hotels, holiday rentals, even home networks all fall into the category of unmanaged infrastructure.

The issue? These environments can quickly become IT blind spots. You can’t patch what you can’t see, and you can’t harden what you don’t control. Even when users apply firmware updates, many of those updates still contain known vulnerabilities. And in most cases, there’s no visibility over whether updates are applied at all.

To quote the NSA, network edge devices “play a critical role in connecting external networks to internal resources and can be targeted by malicious actors to gain access or persist on networks.” The risk isn’t theoretical. It’s live, ongoing, and growing.

Source: NSA February 2025

In addition to software-level risk, there’s also lateral exposure. When your users connect to a shared or unknown network, you don’t know what else is on it. A compromised device elsewhere on that same Wi-Fi could scan or attempt to access your user’s machine. A compromised router could redirect traffic. Without control of the local network, your security posture depends on assumptions you can’t verify.

The Loxada System

Loxada provides a practical, managed solution that brings visibility, consistency, and control to the network edge.

Every device we ship runs our own secure firmware and connects back to your data via a locked-down, centrally managed VPN tunnel. Setup takes minutes. Ongoing management is automated. No local configuration is needed, and every device behaves predictably, no matter where it’s plugged in.

Loxada complements your existing security stack. It doesn’t replace VPN clients, MDM, EDR or IAM tools, it supports them by creating a secure, known network edge physically close to the user. This helps reduce your attack surface and improve the reliability of your other defences.

Loxada's custom firmware

We completely replace the original firmware on each device we supply. This eliminates supply chain uncertainty and ensures a clean, known-good operating environment. The firmware is read-only, tamper-resistant, and persists even after a factory reset.

Automated deployment and updates

Devices are shipped fully configured, tested, and ready to go. End users simply connect them to a local internet connection, wirelessly or wired, enter their email address and if it’s on the system everything works from the moment they connect. No software to install. No repeating login screens. No complicated troubleshooting guides.

Automated Updates

All firmware updates and security patches are managed centrally by Loxada and delivered securely. This ensures continuous protection without relying on users to apply updates themselves, a key recommendation in security agency guidance for edge device hardening.

Loxada devices create a secure Remote Private Network for users.
Loxada has a fully featured administration portal for system administrators.

Simple Administration

Each router checks in automatically with the Loxada management platform. Your IT or security team can control user access and administration, monitor device status and change SSISs and password, without needing remote access to the router itself.

The system is designed to be low-touch but fully auditable, with monthly security reports sent directly to your inbox

Loxada's Technical Architecture

Each device connects to the Loxada network through a secure tunnel. Your traffic is encrypted from the moment it leaves the device, and no other devices on the local network can interact with it.

High-Level Architecture

  • Client device connects via Ethernet or Wi-Fi to a Loxada router
  • Router uses hardened firmware (no vendor code remains)
  • Outbound VPN tunnel initiated from the router to Loxada VPN endpoint

 

Security & Protocols

  • Always-on VPN (OpenVPN / WireGuard supported)
  • Secure boot and firmware validation
  • Blocklist filtering and DNS protection
  • Encrypted management channel for status reporting
  • Updates pulled from authenticated sources only

 

Compliance & Assurance

  • Supports data protection strategies for regulated industries
  • Aligned with network edge security guidance from NSA/CISA
  • Latest third-party security test results available on request

Want more detail? Contact us for a technical conversation.

An overview of Loxada's technical architecture.

Can I Do This Myself?

Yes! You can buy routers, flash them with custom firmware, maintain your own VPN infrastructure, and try to keep everything patched. In fact, we’ve written a blog post with a full checklist if you want to give it a try.

How to set up secure routers for people connecting remotely

But the biggest issue isn’t setup, it’s maintenance. Even a well-configured router running vendor firmware is unlikely to stay secure long-term. Many patches contain known vulnerabilities. And tracking every device, update, and network condition across a dispersed team is resource-intensive.

Loxada gives you a way to solve all of that with minimal overhead. And the peace of mind that comes from knowing your network edge isn’t being left to chance.

Loxada provides us with the assurance of working remotely without any increase in risk or compromise in security. It’s a safety net that allows us to focus on our work.

Law firm

Security Risks Addressed
Home working
Shared offices
Travelling
Off sites
Public Wi-Fi
Compliance
BYOD