COVID-19 EMERGENCY RESPONSE We stand with our partners, business customers, and especially our first and emergency responders on the front lines of this crisis. Read More

SD-Perimeter

With most organizations now rapidly deploying people and devices throughout the edge of their networks, and with security threats increasing and evolving just as fast, securing IoT data has become an ongoing challenge for IT and OT teams everywhere. Software-Defined Perimeter (SD-Perimeter) technology and other zero-trust strategies help organizations easily isolate this IoT data on completely obscured networks atop the public Internet — totally separate from the main corporate network.

Quickly create a zero-trust network for the software-defined security that loT requires.

Cradlepoint’s NetCloud Perimeter feature uses SD-Perimeter technology to create private, perimeter-secured overlay networks that obscure and isolate IoT data without the complexities of traditional microsegmentation. Organizations set up these zero-trust, invitation-only networks in just a few minutes, without detailed command lines or complex configurations.

icon

Build a device-to-cloud IoT network in minutes

With software-defined networking technology, bypass the complexity and lengthy processes of traditional VPNs — allowing your company to rapidly scale up IoT.

icon

Invite then authenticate for zero trust security

NetCloud Perimeter doesn’t grant access to users and devices inside or outside the network until after they’ve been approved.

icon

Easily Overlay Existing Architecture

Overlay networks enable you to roll out data-rich IoT projects across a wide variety of network architectures without laborious reconfigurations.

icon

Microsegment users, applications, and devices

Easily microsegment users, applications and devices to access only the resources they need, with Active Directory integration for additional domain security.,

icon

Isolate data in a private IP space

NetCloud Perimeter’s private IP address space renders your overlay network invisible to potential hackers and web-borne attacks — without having to buy a new address for each device.

icon

Keep users and devices connected

Even when users and devices are on the move, there is no need to relogin or reauthenticate. They maintain always-on private network access, just like on the office LAN.

Features for Software-Defined IoT Security

Security

  • Private IP address space
  • No data stored in the cloud
  • End-to-end encryption of data in transit (256-bit AES)
  • Microsegmentation with device-level SSL encryption
  • Certificate-based Auto-PKI (X.509 CA)

Reliability

  • Runs on top-tier cloud providers worldwide
  • Fully redundant architecture
  • Self-healing and self-optimizing
  • Seamless failover

The latest insights and highlights on how organizations connect beyond traditional wired networks.