Ericsson accelerates 5G for Enterprise with the acquisition of Cradlepoint Read More
With organizations rapidly deploying people and devices at the edge of their networks, and with security threats evolving just as quickly, securing IoT data is a very real challenge for IT and OT teams everywhere. Software-Defined Perimeter (SD-Perimeter) technology and other zero-trust strategies help you easily isolate IoT data on obscured networks atop the public Internet — totally separate from the main corporate network.
Quickly create a zero-trust network for the security that loT requires
Cradlepoint’s NetCloud Perimeter feature uses SD-Perimeter technology to create private, perimeter-secured overlay networks that obscure and isolate IoT data without the complexities of traditional microsegmentation. Organizations set up these zero-trust, invitation-only networks in just a few minutes, without detailed command lines or complex configurations.
Features for Software-Defined
- Private IP address space
- No data stored in the cloud
- End-to-end encryption of data in transit (256-bit AES)
- Microsegmentation with device-level SSL encryption
- Certificate-based Auto-PKI (X.509 CA)
- Runs on top-tier cloud providers worldwide
- Fully redundant architecture
- Self-healing and self-optimizing
- Seamless failover
Cradlepoint's NetCloud Perimeter offers agile enterprises a way to quickly and securely connect people and things. From IT shops looking to gain insights and revenue from IoT devices connected to their networks, to virtual companies that don't have a traditional HQ, NetCloud Perimeter offers compelling value.
The latest insights and highlights on how organizations connect beyond traditional wired networks.