Security at the network edge is a year-round endeavor

Donna Johnson

Cradlepoint offers security features that help protect branch, mobile & IoT networks

Our first Cradlepoint Security Week has come and gone. We had some great conversations, learned a lot, and enjoyed sharing what we know about security at the network’s edge with you. When we planned this weeklong conversation about network and data security, we didn’t know how it would turn out, but it has exceeded our expectations.

It is obvious that the security challenges our networks face is a hot topic — popular among Cradlepoint customers and partners. As you work to securely connect vehicles, branches, IoT devices (even green walls), and other endpoints over wired broadband, LTE, and eventually 5G, we hope Cradlepoint Security Week has provided you some good food for thought.

Companies that are using Cradlepoint NetCloud solutions for enterprise-class connectivity that want to enhance their security capabilities should consider the NetCloud Advanced plan which, across branch, mobile, and IoT, includes most of the key security features we have discussed this week. Boost your network security with a NetCloud Advanced trial or buy it directly in the new NetCloud Marketplace right inside NetCloud Manager.  If you need help adding the NetCloud Advanced plan to your account, we can help you here.

As a summary, Cradlepoint Security Week content can be found here:

WATCH #CPSecurityWeek Webinars

Zscaler and Data Security

IoT Security

Compliance and Mobile Workforce

WATCH #CPSecurityWeek Video


Stay informed about Cradlepoint’s edge solutions and security features at

You might be interested in

Does your agency have a continuity plan?

Does your agency have a continuity plan?

How to keep public safety and election operations running when emergencies arise Public sector agencies provide critical services and perform essential functions that citizens depend on every day as well as during emergencies. Continuity plans ensure that the essential functions of agencies stay operational if a natural or manmade emergency should occur. While it’s difficult […]

Context matters: turning data into threat intelligence

Context matters: turning data into threat intelligence

Guest Post Written By Webroot 1949, 1971, 1979, 1981, 1983 and 1991. Yes, these are numbers. You more than likely even recognize them as years. However, without context you wouldn’t immediately recognize them as years in which Sicily’s Mount Etna experienced major eruptions. Data matters, but only if it’s paired with enough context to create meaning. […]

Ransomware attacks on the rise means organizations require a crisis plan

Ransomware attacks on the rise means organizations require a crisis plan

State & local government agencies can follow IT best practices to create a cybersecurity crisis plan The term: “Everything is bigger in Texas” now includes randsomware attacks, according to a CPO magazine article publish on September 2, 2019. Over the Labor Day holiday weekend, 22 Texas municipalities were hit with ransomware attacks that crippled key city […]