Ericsson accelerates 5G for Enterprise with the acquisition of Cradlepoint Read More

Blog

Trust in edge solutions depends on transparency, communication and innovation

Cradlepoint

Trust in edge solutions depends on transparency, communication and innovation

Continuous improvement marks Cradlepoint’s security posture for cloud-managed routers

As a key supplier in a wide range of industries, Cradlepoint is working hard to build trust and transparency with our customers. Several sectors, including manufacturing, industrial control, and utilities, have been susceptible to supply chain threats. It’s why most industries are working hard to add supply chain risk to their overall risk mitigation strategies — and choosing solutions they can rely on at all times.

Transparency to Customers

We often receive security assessment questionnaires from customers who want to understand the security controls, process, and procedures we have in place. They’re hoping to better understand any potential risks associated with using Cradlepoint NetCloud for LTE communications. While questionnaires can be helpful, our best tool for educating network administrators and IT professionals about Cradlepont’s security strategy is a conversation with our knowledgeable sales team. We welcome your questions whether you’re considering Cradlepoint solutions or want to better understand how we secure the solutions you already have.

Sharing Results of Regular Security Assessments

We perform annual third-party penetration tests on our hardware, software, and cloud services – giving current and prospective customers all the information they need to make informed solution decisions.

Continuous Improvement & Accelerated Innovation

This year we launched our private bug bounty program, through Bugcrowd, which provides valuable ongoing penetration testing for a continuous R&D development model. Incenting white hat researchers all over the world to hack our solutions and identify vulnerabilities year-round, we are confident we are reducing customers’ operational risk with our solutions compared to a “point in time” penetration testing approach completed once a year through a single company.

This process accelerates the delivery of new and improved Cradlepoint NetCloud features that benefit everyone we work with.

Timely Communication of Vulnerabilities

Reporting and addressing security issues quickly is extremely important to us, because fast resolution reduces the likelihood and impact of vulnerabilities in our solutions. Our R&D, Quality Assurance and Support organizations are committed to quick turnarounds on any Cradlepoint vulnerabilities, aligned with theIR severity level based on the Common Vulnerability Scoring System (CVSS).

Our vulnerability disclosures are communicated to customers, partners, and eventually the public through our trust page and our responsible disclosure process. You can always submit a vulnerability or security concern via security@cradlepoint.com.

Helping Lead the Way with Security Trends

In the constantly evolving world of network security, staying up to date with the latest needs and trends is crucial. To that end, we’re supporting emerging carrier security certifications of our IoT routers, including use cases focused on the world’s first responders. It’s an emerging space that truly is raising the tide of business IoT solution security maturity across the industry.

As 2020 draws near, Cradlepoint’s keen attention to and passion for new security opportunities will continue as we invest in opportunities to reduce risk for our customers.

Explore More About Trusting Cradlepoint

For a deeper exploration of the security processes built into Cradlepoint’s solutions, read our trust page.

 

Back to Blog

You might be interested in

Does your agency have a continuity plan?

Does your agency have a continuity plan?

How to keep public safety and election operations running when emergencies arise Public sector agencies provide critical services and perform essential functions that citizens depend on every day as well as during emergencies. Continuity plans ensure that the essential functions of agencies stay operational if a natural or manmade emergency should occur. While it’s difficult […]

Security at the network edge is a year-round endeavor

Security at the network edge is a year-round endeavor

Cradlepoint offers security features that help protect branch, mobile & IoT networks Our first Cradlepoint Security Week has come and gone. We had some great conversations, learned a lot, and enjoyed sharing what we know about security at the network’s edge with you. When we planned this weeklong conversation about network and data security, we didn’t know how […]

Context matters: turning data into threat intelligence

Context matters: turning data into threat intelligence

Guest Post Written By Webroot 1949, 1971, 1979, 1981, 1983 and 1991. Yes, these are numbers. You more than likely even recognize them as years. However, without context you wouldn’t immediately recognize them as years in which Sicily’s Mount Etna experienced major eruptions. Data matters, but only if it’s paired with enough context to create meaning. […]