Devices connected to a Loxada Remote Private Network are secure from risks from other devices around them.

What is Loxada?

Loxada is the next level of connectivity security for people working in serviced offices, coworking spaces, when travelling or from home.

 

When connecting to networks outside your IT team’s control, the best way to protect your company, team, and clients is to have a separate, secure network device for each team member that can only be used for work; Loxada’s remotely managed devices provide this and more.

Best practice cyber security

Loxada combines cyber security best practice of separating remote users from people and devices around them with secure, automatically updated routers they use to connect wherever they are, all managed for you by us.

Physically separate devices

By physically separating work devices from other networks, Loxada provides an extra layer of protection that goes beyond traditional cyber security measures. We call this a Remote Private Network (RPN).

Secures people wherever they are

Loxada creates a secure, managed network wherever users connect to third-party or home networks outside your control. It's easy to set up, manage, and maintain, giving users the flexibility to manage their workload securely no matter where they are.

Not knowing about the security of the remote networks that users connect to is a security risk.

Remote workers' routers are black holes

Managed offices and coworking spaces

It's virtually impossible to confirm the security of the IT networks in the locations where your users work if you don't manage them yourself.

Multiple ISPs and devices

Users have lots of options for who their Internet connection providers are and the routers they use. This is great for them but terrible for you to keep track of and secure.

Devices outside your control are a risk

No matter how good your security measures are, devices you don’t have access to or know anything about will always pose a significant threat.

Devices outside your control are risky for the devices that you do control.

Better security comes from reducing security unknowns. Loxada does that efficiently and cost-effectively and without the need for resources from us.

Cyber security firm

Security Risks Addressed
Home working
Shared offices
Travelling
Off sites
Public Wi-Fi
Compliance
BYOD

Why choose Loxada?

The ever-increasing numbers of people connecting to data from networks outside your control bring forth new challenges in cybersecurity, making it crucial for organisations to adapt and fortify their defences. Traditional security measures often need to provide more comprehensive protection for remote workers. Loxada fills this gap by offering a unique, all-in-one solution.

 

Choosing Loxada means you’re opting for a security solution tailored to the specific needs of remote and externally managed IT environments. Every aspect of Loxada is designed to provide next-level security while simplifying the user experience, from our custom firmware on the devices we supply to the bespoke management portal.

Loxada's custom firmware

Loxada’s custom firmware on the devices we supply is the cornerstone of its security solution. These are not your run-of-the-mill routers; our firmware has been specifically designed to physically separate work devices from other networks easily for IT, security teams and end-users alike. This ensures your work data remains secure, even when connected to public, shared or home networks.

Our firmware ensures our devices are incredibly user-friendly, requiring minimal setup. Once connected, they work in the background to provide constant security, allowing you to focus on your work without worrying about potential cyber threats from other devices on an uncontrolled network.

Loxada can deliver devices to your office or directly to users.

Automated deployment and updates

One of Loxada’s standout features is its automated deployment and management. We send you or your team their devices and ensure they are constantly updated with the latest security protocols. This frees up valuable IT resources, allowing your team to focus on more pressing matters.

Loxada’s devices are designed to be managed by us for you. They self-update, ensuring your users always have the latest security features. This happens seamlessly, without requiring any user or IT intervention.

 

Loxada devices can even be deployed and managed with zero IT input for busy IT teams or companies without dedicated IT resources.

The Loxada management portal

Loxada offers a bespoke management portal as the control centre for all your Loxada devices. The portal is incredibly user-friendly, making registering new users, managing devices, and monitoring security metrics easy. All of this is done from a single, intuitive interface.

The management portal is not just about ease of use; it’s about giving you complete control. 

Loxada has a fully featured administration portal for system administrators.
Lateral movement is where an attacker tries to compromise devices and systems around them.

Why is lateral movement a threat to worry about?

Lateral movement is a tactic that distinguishes today’s advanced persistent threats (APTs) from simplistic cyberattacks of the past.

Lateral movement allows a threat actor to avoid detection and retain access, even if discovered on the machine that was first infected. And with a protracted dwell time, data theft might only occur weeks or months after the original breach.

 

After gaining initial access to an endpoint, such as through a phishing attack or malware infection, the attacker impersonates a legitimate user and moves through multiple systems in the network until the end goal is reached. Attaining that objective involves gathering information about various systems and accounts, obtaining credentials, escalating privileges, and ultimately gaining access to the identified payload.

Loxada's technical architecture

Loxada’s custom firmware is engineered to establish a Remote Private Network (RPN), providing an additional layer of security for remote and hybrid workers. While the devices utilise a modern fast encryption technology for secure backhaul connections, the emphasis is on creating an RPN that terminates at Loxada’s secure data centre capable of handling large bandwidths.

This is achieved solely through our hardware-based solutions without additional software.

Our devices and firmware are designed to interact seamlessly with existing network infrastructures, employing a range of hardware-based protocols to ensure secure data isolation.

 

Loxada does not replace any VPN or Corporate Controls already in place; Loxada will work seamlessly alongside them and provide the next level of security.

An overview of Loxada's technical architecture.
It is a simple process to get users set and and running with Loxada.

Loxada's automated deployment

One of Loxada’s standout features is the automated deployment process, which is designed to simplify the rollout of devices across an organisation.

This is achieved through firmware and security protocols that handle everything from device registration to initial setup. 

Once deployed, devices automatically configure themselves based on individual users’ bespoke settings, making the process virtually hands-free for IT departments.

Loxada's automated updates

Loxada’s devices are built with automated updates in mind, ensuring that each device is always running the latest and most secure version of its software. 

The update mechanism is designed to be non-intrusive, running in the background without manual intervention.

 

This is made possible checksum verification, secure data transmission, and rollback features in case of update failure.

Complementing existing security measures

Loxada is designed to enhance, not replace, your existing corporate security measures. A multi-layered approach is often the most effective in today’s increasingly complex cyber security landscape.

Loxada’s Remote Private Network (RPN) serves as this additional layer, working alongside your existing security infrastructure. The RPN feature provides a dedicated, isolated network for work-related activities, ensuring that work devices are physically separated from other devices on home, public or uncontrolled networks. This reduces the risk of cross-network attacks and data breaches while filling in potential security gaps.

 

The RPN is engineered to be compatible with a wide range of existing security protocols. Whether your organisation employs Corporate VPNs, two-factor authentication, end-to-end encryption, or other advanced security measures, Loxada’s RPN can seamlessly integrate into your current setup. This compatibility ensures you don’t have to overhaul your existing security protocols to incorporate Loxada, making it a versatile addition to any security stack.

 

In an era where cyber threats are continually evolving, the adaptability of your security measures is crucial. Loxada’s RPN is agile and capable of receiving firmware updates to counter threats as they emerge.

 

By adding Loxada to your security measures, you’re not just patching holes but building a more resilient, robust, and future-proof security infrastructure. This extra layer of protection can be invaluable in today’s ever-changing cybersecurity landscape.

Loxada works with all security measures you already have in place.

Loxada's security protocols and compliance

Loxada’s custom portal, hardware and RPN technology adhere to stringent security protocols, including advanced encryption algorithms and secure key management at the hardware level.

The solution is also engineered to meet or exceed various compliance standards, offering additional assurance of its security capabilities; regular security audits are carried out, and the most recent test results are always available upon request.

The Loxada system is built according to security best practice and regularly tested for security issues.

Why wouldn't I implement this myself?

We know that budgets are finite and that engaging with new suppliers can be a painful process no matter how user-friendly they claim to be (we really are very user-friendly, needless to say!)

In purely technical terms, replicating the basic functionality of the Loxada system yourself is pretty straightforward, and we’ve even written a blog post to guide you on what’s required.

 

However, the process involves multiple steps, from initial setup to ongoing monitoring and compliance checks. So, the time and resource commitment can be substantial, including manually configuring employees’ home routers as part of the initial setup and additional hours for quarterly reviews and tracking user’s ISP changes.

Loxada made moving our entire team to being securely fully remote simple and doesn’t require our time to keep it that way.

Professional membership association

Security Risks Addressed
Home working
Shared offices
Travelling
Off sites
Public Wi-Fi
Compliance
BYOD