Host/Server connectivity options.
Whether you choose to utilize one or more of CrossBridge Solutions' networks for your wireless telemetry applications, you will need only one connection into CrossBridge. We have over 20 years of expertise in developing and delivering the most secure connectivity options available. We will manage private, redundant network connectivity and authentication for you. CrossBridge can provide a suite of connectivity options from each of your server locations. This allows for low-cost connectivity and increased network reliability, while maintaining secure private access to all of your devices.
When running a wireless data solution, you need to be aware that you are charged by the amount of data being passed to and from the device. In many cases, the Internet is used to connect with the network carriers because it is simple and affordable, but this opens the door to security issues and unauthorized traffic to those wireless devices. CrossBridge's investment in private connectivity to the network carriers isolates your wireless devices from public access and unauthorized traffic, which means that your monthly airtime costs can be reduced.
At CrossBridge you have choices - whether you choose our secure Internet options, a secure VPN connection, or something in-between - you can be confident that our Project Managers will help you determine which solution is best for your business. You can choose from one or more of the following options:
- Direct Internet Access
- Encrypted or Non-encrypted Software VPN
- Encrypted or Non-encrypted Hardware VPN
Direct Internet Access
CrossBridge Solutions offers the Internet Direct option for customers with device based request/response applications (e.g. credit card transaction) where the request is originated by the wireless device. Device traffic flows over-the-air and then traverses the Internet. With the Internet Direct option, the wireless device must originate all sessions. The CrossBridge Solutions Dynamic Network Architecture blocks non-device initiated traffic to prevent unauthorized usage.
A VPN uses "virtual" connections routed through the Internet from one company's private network to a remote site such as CrossBridge Solutions. These systems use Tunneling Protocol to ensure that only authorized users have the controlled access. Tunneling Protocol keeps proprietary data reasonably secure, even though the path exists in the Internet public communication channels.
Non-encrypted or Encrypted "Software" VPN
The CrossBridge Solutions Software Tunnel option provides a path for customer traffic over the Internet by creating a dedicated Layer 2 Tunnel (L2TP). For Windows based operating systems (and some Linux OS), we provide configuration files, which will run on a Customer's client/host. The client host will initiate communication by authenticating at CrossBridge Solutions. After establishment, host and device traffic can flow through the tunnel. The CrossBridge Solutions Software Tunnel option is sometimes referred to as a non-encrypted VPN connection as we disable IPSec (IP Security) during configuration.
An encrypted VPN connectivity option is available which uses IPSec. If encryption is absolutely necessary, encryption should be provided by by an end-to-end application and not just on the client/host connection.
Encrypted or Non-encrypted Hardware VPN
The CrossBridge Solutions Hardware Tunnel option provides a path for customer traffic over the Internet by creating a dedicated Layer 2 Tunnel (L2TP). A hardware solution is popular for clients that need multiple hosts to share a single connection to their wireless devices. In most cases, we provide the hardware appliance. The appliance will initiate communication by authenticating at CrossBridge Solutions. After establishment, host and device traffic can flow through the tunnel. The CrossBridge Solutions Hardware Tunnel option is sometimes referred to as a non-encrypted VPN connection as we disable IPSec during configuration.
An encrypted VPN connectivity option is also available. However, if encryption is absolutely necessary, encryption should be provided by by an end-to-end application and not just on the client/host connection.
Do I really need encryption?
In cases where a high level of security is necessary, the strongest possible encryption should be used end-to-end. This must include the entire virtual connection between the customer host/server and the wireless device, not just on the host/server method of connectivity.
CrossBridge can help you to plan, pilot, and deploy the most efficient, cost-effective wireless solutions available.
Give us a call, and within minutes of talking with the sales team you will understand -
WE KNOW WIRELESS!