Exium announced the premiere of its Secure 5G network as a service, based on the emerging Clean Network standards being promulgated by the US, EU and other freedom-loving nations.
Exium’s 5G network service is built on an open, programmable, reliable, and software-driven Intelligent Cybersecurity Mesh that treats the internet itself as Zero Trust and relies heavily on strong encryption for all data transmitted, processed, or stored anywhere on it. This approach enables secure and private end-to-end connectivity and provides the ability to securely operate anywhere and anytime, regardless of the environment, even on underlying networks that may be compromised.
Exium’s clean network is rooted in internationally accepted digital trust standards such as the Criteria for Security and Trust in Telecommunications Networks and Services developed by the Center for Strategic and International Studies (CSIS), the Prague Proposals, and the European Union’s 5G Toolbox.
The end-to-end clean network utilizes trusted hardware and software components, including the cloud-infrastructure and global backbone built and operated exclusively by US companies, such as Amazon, Google, and Microsoft.
Exium launched as a startup to serve businesses that are increasingly demanding the same end-to-end security standards that the US government requires for its communications.
“The only way to be sure a network is clean is architecting and building it from the bottom up. The recent spate of cyberattacks were possible because outdated, proprietary systems are still being used across organizations,” said Farooq Khan, founder, and CEO at Exium.
Exium’s 5G clean network service is available globally on six continents. The service is device and network agnostic, and users can benefit from 5G clean network security and privacy on 4G, WiFi, Fiber, Cable or even Satellite networks.
The service natively works with 5G devices without requiring any software updates. For non-5G devices, including Windows and Mac computers, a 5G software app, available on Exium’s website, is required.
“We further enhance Safety and security for our customers with the Silicon Root of Trust technology. Apple uses hardware security for some of its services like biometric data, for Face or Touch ID, as well as Apple Pay data. We extend hardware security to all applications and services on all devices. Every single bit transmitted over the network is protected with high-grade encryption rooted in the silicon,” said Khan.