Blog

High Cost of Downtime Part 1

POS image

A tree falls in high winds. A snowstorm sweeps into town. A backhoe digs a little too far to the left. Lightning strikes a telephone pole. Floodwaters inundate city streets. All of these acts of nature (or of humans) threaten business continuity. When a business loses its Internet connections, it loses revenue; and a whole lot more.

Industry Groups Coordinate Cyber Threat Information Sharing

Lock Image

Last fall, Cradlepoint CSO Kent Woodruff wrote a blog post about Adam Shostack’s theme for his opening address at 2014 BSidesLV. Shostack spoke at length about “information sharing as the ultimate act of self-preservation.” The exponential rise in criminal intrusions into public and private databases in the recent past has precipitated the creation of a number of information sharing organizations by both the private and public sectors.

6 Ways Cradlepoint Helps the Public Sector

Police Car Image

Technology has given us the power to see in real-time exactly how jobs are being performed. That information can lead to more efficient ways to get work done. For the public sector, that can result in better services to taxpayers and more money saved over all. We think we can provide the public sector with solutions that are smart, easy-to-use and that, at the end of the day, save organizations precious taxpayer dollars.

Part 4: Cradlepoint + Zscaler Defeats Specific Security Threats

In my last post (Part 3: The Rise of Intelligent Routing) I talked about how Cradlepoint and Zscaler work together to create “intelligent routing” for Internet security and application control. We call it intelligent routing because once you configure the Zscaler Internet security on the Cradlepoint router, it routes web traffic in a specific way depending on the site the users are trying to access.

Part 3: Cradlepoint + Zscaler Defeats Specific Security Threats

In Part 1 of this series (Part One: Why are Branch Offices so Vulnerable?), I looked at some of the reasons why branch offices are so vulnerable to data breaches. In Part 2, (The changing face of malicious attacks), the topic was the new forms these attacks are taking. In Part 3, I’d like to talk about how the solution Cradlepoint has developed with Zscaler defeats these new attempts to access corporate networks.