Menu

IoT FEATURE NEWS

SDN Strategies for IoT Security

By

The potential for widely distributed IoT devices to streamline operations is vast, but so are the security implications. From branch sites and vehicles to M2M and IoT deployments in the wild, IoT is creating the biggest attack surfaces that IT teams have ever seen.

A new webinar from Cradlepoint and IoT Evolution, entitled SDN Strategies for IoT Security, will explore the issues inherent in that reality. The webinar will take place Tuesday, April 24 at 2 pm Eastern/11 am Pacific. Click here to get in on the conversation.

Mirai botnets, WannaCry, and other well-publicized incidents illustrate the breadth of today’s IoT threats, which are too prevalent and advanced to address with traditional security tools. Many organizations are recognizing the need for software-defined, policy-based security solutions that isolate IoT devices and protect organizations' most valuable data — regardless of the WAN source.

During the webinar, attendees will learn about:

  • IoT security challenges
  • Best practices for mitigating IoT security risks
  • How Software-Defined Perimeter technology is changing the way IoT networks are secured
  • How to create a perimeter-secured overlay network for IoT devices in about 5 minutes

Who should attend:

  • Network administrators who need IoT security options that can be deployed and managed from anywhere
  • CIOs interested in saving reducing costs, man-hours, and complexities surrounding IoT security

Presenters
Ken Hosac
IoT Strategy and Business Development
Cradlepoint

Brandon Ashey
Infrastructure and Security Manager
Cradlepoint

Moderator
Carl Ford
CEO and Co-Founder
Crossfire Media


Ken Briodagh is a writer and editor with more than a decade of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

I've Asked the Security Experts, But It's Time You Have Your Say

By: Carl Ford    6/27/2025

Security experts are quick to say they know what's happening, but here's your opportunity to weigh in on the state of cybersecurity in IoT.

Read More

Mary Meeker Returns with AI and Breezes Past AIoT

By: Carl Ford    6/26/2025

We are entering an era where intelligence is not just embedded in digital applications, but also in vehicles, machines, and defense systems

Read More

Nothreat Fights AI Fire with AI in Firewalls

By: Carl Ford    6/26/2025

According to Nothreat, the only way to fight AI cyber threats in IoT with AI is to go beyond detection and into active containment, deception, and aut…

Read More

How Kapitus is Reshaping SMB Funding

By: Carl Ford    6/16/2025

Kapitus is a financial institution that provides various financing solutions to SMBs, operating as both a direct lender and a financing marketplace.

Read More

Slicing Up the Network with 5G SA: An Interview with Telit Cinterion's Stan Gray

By: Carl Ford    6/10/2025

Carl Ford speaks with Stan Gray about 5G SA, network slicing, and trends, challenges, and opportunities related to both.

Read More