Cradlepoint Blog
9 FOLLOWERS
Get the latest info and insights about wireless edge networking using cloud-managed LTE and 5G for business solutions. Explore the reliability, flexibility, and security of cellular networks for branch, mobile, and IoT network deployments. Cradlepoint enables the freedom to connect people, places, and things that drive more experiences, more ways to work, and better business results - anywhere.
Cradlepoint Blog
4d ago
Finding the best business router requires taking a deeper look at the features that matter most, from reliable connectivity to security
Imagine you’re shopping for a new car. Like any investment, you wouldn’t just grab the first one you see — you’d likely have a checklist of non-negotiable features, from fuel efficiency to safety ratings and other tech integrations. The same meticulous approach applies when selecting the best business router. Just as the right car keeps you cruising smoothly on the highway, the right router ensures your business stays connected and on the road to success ..read more
Cradlepoint Blog
2w ago
5G and Starlink have unique advantages, but when used together they provide greater reliability and bandwidth
The saying “Why choose one when you can have both?” can be applied to many things in life, like having both pizza and tacos for dinner or enjoying a sunny beach day and a cozy night in with a good book. For businesses, this philosophy extends to their connectivity solutions.
When looking for the most reliable mobile solution with which to connect your enterprise network and presented with the choice between satellite or cellular, the answer is simple: both. Using Starlink a ..read more
Cradlepoint Blog
3w ago
Who’s lurking among your meeting attendees? Virtual meeting isolation technology keeps uninvited threats at bay
Few things are scarier than an unsolicited video call during the workday, but whether planned or unannounced, nearly 80% of employees use video communication for 1-on-1 and team meetings, making these virtual pow-wows inevitable. Virtual meeting software such as Zoom, Microsoft Teams, and Google Meet are ubiquitous across enterprises and often an overlooked threat vector, making virtual meeting security a vital component of in-depth network defense.
The risks associated with virtual ..read more
Cradlepoint Blog
1M ago
The pace of fire and police tech adoption is only as fast as an agency’s ability to ensure its network is robust, secure, and can accommodate myriad applications
In 1899, Akron, Ohio, made its mark on history by introducing the first police car: an electric wagon equipped with lights, a gong, and a stretcher. Almost 30 years later, Detroit, Michigan, boasted a first-of-its-kind modification to the existing police cruiser by installing a one-way radio system to broadcast crime information. Since then, advancements in police tech have transformed patrol cars into mobile command centers and ..read more
Cradlepoint Blog
1M ago
Private networks create a flexible, secure, high-performing foundation for advanced IoT in manufacturing
In 1952, two best friends gave the world a glimpse into the limitations of factory work on an episode of “I Love Lucy.” As the pair frantically hand-wrapped chocolates from a speeding conveyor belt, it became evident that the operational demands of the candy manufacturing facility outpaced human abilities. Modern manufacturing automation and connectivity advancements have rendered these “I Love Lucy” scenarios all but extinct. Still, the increase in technological complexity and data traffic ..read more
Cradlepoint Blog
1M ago
Bringing SASE and SD-WAN together offers a streamlined approach to enterprise networking and security
Imagine if buying a car meant only getting the engine without any safety features like airbags, anti-lock brakes, or collision detection systems. The vehicle probably runs fine, but the risk of driving it without these safety measures outweighs its benefits. Similarly, standalone software-defined WAN (SD-WAN) offers robust connectivity but falls short of providing essential security features needed to protect modern enterprise networks.
Just as we wouldn’t settle for a car without airbag ..read more
Cradlepoint Blog
1M ago
When looking at digital transformation, two WAN technologies have been making headlines: 5G and SASE. While 5G delivers a more agile form of WAN connectivity, SASE (Secure Access Service Edge) represents a convergence of WAN networking and security. But what happens when these two transformative technologies intersect?
With SASE finally becoming mainstream, most solutions address use cases that support fixed sites and remote work. WAN connectivity is predominately wired broadband, and if cellular is part of the network, it is often there as a failover connection.
Now, 5G is delivering the perf ..read more
Cradlepoint Blog
2M ago
Each quarter, the Cradlepoint Threat Intelligence and Analysis (TR&A) Team publishes a threat intelligence report to inform customers about relevant changes in the threat landscape. This report covers events from January through March 2024.
Our Views on Recent Attacks
This quarter’s report is focused on the increasing threats to credentialed access. Two factor authentication (MFA or 2FA) has been a standard of good security. However, the effectiveness of MFA and other credential defenses are under threat by new and improved threat actor tools. Phishing as a Service (PhaaS) and botnets are ..read more
Cradlepoint Blog
2M ago
In a world where simplicity is key, SASE emerges as a simplified solution to optimize networking and increase security for enterprises
If you’re in the tech space, chances are you’ve come across the term SASE (pronounced “sassy”). Besides being your teenager’s most obvious attribute, what does SASE mean, and why is Gartner predicting that at least 40% of enterprises will have explicit strategies to adopt it before 2025?
SASE (Secure Access Service Edge) is more than just a catchy (or confusing) acronym. By combining security and networking technologies into one cloud-based solution, SASE ..read more
Cradlepoint Blog
2M ago
Isolating web applications protects enterprise networks from third-party access risks and threats
In the late 2000s and early 2010s, people had multiple personalities when it came to their devices. On one hand, their Blackberry pinged with email notifications from work. On the other hand (literally), their fingers left prints on the touchscreen of a new iPhone. Companies recognized that employees preferred using personal devices, which typically featured the latest technology and were customized to their preferences.
While this realization spurred “bring your own device” (BYOD) to become mains ..read more