Enabling a software-defined overlay network for secure, global M2M-IoT connectivity resolves the challenges of legacy architecture — the connection is persistent and failures are reconnected by the cloud automatically, no advanced configuration is necessary, and encryption and PKI are deployed as a service.
Everyone's Blog in M2M
Cradlepoint's 2016 Summer Product Launch brings new products and services, including the COR IBR600B/IBR650B series, platform extensibility, and new firmware and ECM enhancements. To learn more, register for our upcoming webinar on Aug. 23, 2016, at 9 a.m. PDT/12 p.m. EDT.
The Internet of Healthcare Things is transforming the way medical providers promote healthy lifestyles to the well and diagnose and treat the sick. The benefits of IoHT include a reduction in the cost of care (and thus the potential to slow down the rate of medical premium increases), a healthier general population, better outcomes for the sick, and the ability of older people to receive care in their homes instead of at the hospital.
In this blog, we look at specific examples of Internet of Healthcare Things (IoHT) enabled mobile and/or decentralized healthcare. All of these examples depend on secure, reliable Internet connectivity to improve the health of the general population.
With many medical professionals using an expanding variety of connected devices, it is essential that hospital IT administrators have the ability to monitor and protect this IoHT flowing across their networks.
Last fall, Cradlepoint CSO Kent Woodruff wrote a blog post about Adam Shostack’s theme for his opening address at 2014 BSidesLV. Shostack spoke at length about “information sharing as the ultimate act of self-preservation.” The exponential rise in criminal intrusions into public and private databases in the recent past has precipitated the creation of a number of information sharing organizations by both the private and public sectors.
In Part 1 of this series (Part One: Why are Branch Offices so Vulnerable?), I looked at some of the reasons why branch offices are so vulnerable to data breaches. In Part 2, (The changing face of malicious attacks), the topic was the new forms these attacks are taking. In Part 3, I’d like to talk about how the solution Cradlepoint has developed with Zscaler defeats these new attempts to access corporate networks.
As businesses enter the Internet of All Things, the recurrent concern of security is not far behind. Whether it’s POS devices, digital signage, customer WiFi, kiosks, video surveillance—or even HVAC control, every new connected device brings with it the risk of an information breach.
I am a member of the advisory board and regular contributor for M2M Evolution magazine, a new publication from TMC that provides in-depth coverage of the shift toward greater connectivity in the rapidly expanding machine-to-machine environment.