Skip to content

Secure Remote Workforces

Crux VPN is built for a world where work doesn’t happen behind a firewall. Whether users are on the move, working from home, or operating in untrusted environments, Crux VPN provides secure, seamless remote access without the operational drag of legacy VPNs or certificate-based systems.

Instead of relying on static credentials, hardware tokens, or brittle key infrastructure, Crux VPN dynamically provisions short-lived, symmetric keys to every trusted device — enabling quantum-safe, zero trust communications with minimal setup and no user intervention.

Problem

Traditional remote access solutions were never designed for the way we work today:

  • Traditional VPNs are centralized, fragile, and dependent on fixed infrastructure.
  • Hardware encryption devices are expensive, immobile, and hard to scale.
  • Public-key infrastructure (PKI) introduces certificate sprawl, long-lived credentials, and complex revocation logic.
  • Wireless and commercial networks are often considered untrusted — and unsupported.

All of this leads to security friction, increased costs, and a poor experience for users and administrators alike.

Crux VPN in action

Crux VPN securely connects users and devices across any network — Wi-Fi, LTE, 5G, or satellite — using ephemeral symmetric keys generated on demand. Keys are provisioned via an embedded broker (based on Arqit SKA-P), ensuring that no static credentials are stored, and no single point in the system ever holds enough information to compromise a session.

Access policies are enforced in real-time, and keys rotate automatically with every session, supporting continuous authentication and dynamic trust. The result is a system that’s lightweight, highly secure, and operationally invisible to the user.

Design highlights

  • Crux-native authentication and key exchange — no certificates, no tokens, no manual provisioning.
  • Symmetric key model built for post-quantum resilience and crypto-agility.
  • Bearer-agnostic — works securely over any network, including low-trust or bandwidth-constrained links.
  • Split trust by default — no party holds a complete picture of the keying process.
  • Pluggable trust fabric — supports a variety of underlying key brokers, including Arqit.

Benefits

Area Advantage
Security No long-lived credentials, no reliance on vulnerable public key crypto
Simplicity Software-only, zero-touch setup for users and admins
Mobility Works from anywhere — no dependencies on enterprise networks
Resilience No centralized choke points or static secrets
Standards Compatible with enterprise encryption policies and future crypto mandates

When to use Crux VPN

Crux is ideal for teams and organizations that need:

  • A secure access layer for hybrid or remote teams
  • Post-quantum ready infrastructure without operational disruption
  • Mobility and flexibility across devices, networks, and geographies
  • A zero trust approach that doesn’t rely on brittle PKI
  • Interoperability with both legacy systems and forward-leaning security models