FreeWave Technologies’ Elements™ ES1000 with Zentry™ Achieves Zero Findings in Independent Rapid7 Penetration Test
Clean result from one of cybersecurity’s most recognized offensive security firms validates Zentry’s operational zero-trust architecture for industrial, federal, and critical infrastructure networks April 9, 2026, BOULDER, Colo. — FreeWave Technologies today announced that its Elements™ ES1000 connected device with Zentry™ embedded received zero findings in an independent penetration test conducted by Rapid7, one of the most widely recognized names in offensive cybersecurity and vulnerability research. The result — zero findings across every attack surface tested — is legitimately uncommon in the industry. Recently cited industry average for network and hardware engagements is 5 to 7 findings per engagement, with nearly a third of all tests uncovering at least one critical flaw. In the IIoT and OT hardware space specifically, clean third-party assessments are even rarer: legacy protocol support and hardware constraints force security trade-offs that almost always surface during rigorous testing. The Elements™ ES1000 with Zentry had none of them. Zentry Cloaks Your Network Zentry was purpose-built to make industrial and federal networks invisible to attackers. Where traditional security tools attempt to defend a visible perimeter, Zentry cloaks the network itself eliminating the attack surface before exploitation can begin. Embedded in the Elements™ ES1000, Zentry enforces zero-trust architecture at the device level: no implicit trust, no lateral movement, no exposed management interfaces. Every connection is authenticated, encrypted, and continuously monitored. Zentry is available embedded in the FreeWave Elements ES1000, as a standalone solution, or deployable on third-party devices giving OT teams, MSPs, and system integrators the flexibility to secure existing infrastructure without a full hardware refresh. The Rapid7 result validates the architecture itself, meaning that validation travels with the solution regardless of deployment path. “This isn’t a product claim,” said Steve Wulchin, Chairman and CEO at FreeWave Technologies. “This is what happens when a purpose-built zero-trust architecture meets one of the most rigorous independent security assessments in the industry. Zero findings means the attack surface Rapid7 was looking for simply wasn’t there.” Four Layers. No Gaps. Zentry’s security posture is built on four integrated layers: hardware root of trust, encrypted communications, identity-based access control, and continuous monitoring. Rapid7’s penetration test probed each of these layers independently and in combination across the Elements™ ES1000 platform. The result validated what FreeWave’s engineering team designed for: a system with no exploitable gaps between layers, no residual exposure from legacy protocol support, and no trade-offs between operational continuity and security integrity. For OT engineers, that means Zentry secures existing infrastructure without rearchitecting the network. For CISOs and compliance stakeholders, it means independent audit results that directly support CMMC, NIST 800-171, and ICS security framework requirements. For federal and DIB buyers, it means a validated security posture from a firm their own auditors already recognize. Deploy Without Disruption. Validated. One of the most persistent objections in OT security procurement is the fear that hardening the network means breaking the operational technology running on it. Zentry was designed to eliminate that trade-off and the Rapid7 assessment confirms the architecture delivers on that promise. The Elements™ ES1000 was tested in conditions that reflect real industrial deployment environments, and the clean result means security teams can present independent validation to leadership, program managers, and compliance auditors without qualification. Whether Zentry is deployed on the Elements™ ES1000 or integrated into a third-party device, the security architecture is the same. The Rapid7 result validates the solution, not just the hardware. About FreeWave Technologies FreeWave Technologies has secured industrial communications for more than 30 years across defense, energy, agriculture, and critical infrastructure. Based in Boulder, Colorado, FreeWave’s portfolio spans industrial IoT hardware, software, and security solutions purpose-built for the most demanding operational environments in the world. For more information, visit freewave.com/zentry or contact [email protected].
Stranger than Fiction: 3 Essentials of an Industrial Network Security Strategy with Chase Cunningham

“You must remember … as many times as we win, the bad guys only get better. Our battles are just beginning!” These words conclude a graphic novel by Dr. Chase Cunningham and coauthor Heather Dahl. In “The Cynja: Volume 1,” the protagonist is the evil Botmaster. His thick, purple tentacles; sharp, black claws; and digital-looking scythe try to take down networks in the time it takes to turn the page. The concept is scary real. We sat down with Cunningham for our blog, “Stranger than Fiction: Exploring the New Battlefield at the Industrial Edge with Chase Cunningham (Part 1),” where we explored the rise of cyber threats on the industrial edge and why turning things on, crossing your fingers, and hoping your network stays safe is antiquated and risky. Cunningham, a former U.S. Navy officer who worked in cryptology with National Security Agency and Forrester street cred, now consults with international companies and public organizations. His military experience taught him two things. First, small businesses are targets for nation states because of their connective links to other things (the nature of technology is that attackers get past defenses and sprawl; it’s the difference between a break-in and a break-in-and-move-into-every-room scenario). Second, if you fail to plan, you plan to fail, underscoring Cunningham’s favorite wrong to right. He maintains that operational leaders should remove trust inside the network, first and foremost. Here, we give you three essentials for your network security strategy at the industrial edge, directly from Dr. Zero Trust himself. Essential #1: Offense Wins For OT (operational technology) leaders seeking to protect edge infrastructure, an offensive strategy increases your odds of staying secure. Dramatically. Cunningham’s perspective is clear: the advantage belongs to those who think like attackers. “Are you willing to engage in a red team operation … and let a group of hackers essentially come at you and tell you where you’ve got vulnerabilities?” If the answer is no, then he says there’s an issue right there. For Cunningham, an offense-minded strategy starts with confronting reality and actively probing for security weaknesses the same way an adversary would. That mindset is critical because, in his words, “how can you possibly defend what you don’t know about?” Industrial environments are often sprawling, with unseen or unmanaged assets. Without full visibility, attackers will exploit your most vulnerable gaps first. He frames out the risk in real time. “I could breach these folks in about 25 minutes.” The “folks” Cunningham refers to are fuel centers talking to the internet that he has, with a few clicks, identified. Even more concerning, “a lot of these have crappy usernames and passwords like admin passwords. I could go in there and change fuel controls.” The takeaway isn’t theoretical. Attackers win because they take direct, simple paths into exposed systems. Organizations that take a defensive stance, he says, don’t test potential paths themselves. Instead, they wait for an attacker to do it for them. Cunningham is equally blunt about why traditional approaches fail. “Security by obscurity is not going to keep you safe.” Piling on tools doesn’t solve it either. “If the dart board is continuously moving,” he says, “the odds of me hitting that bullseye is pretty slim.” Reactive defense cannot keep pace with adaptive threats. “Getting breached is not the big problem,” Cunningham adds. “Someone will find a way to get past whatever defense you’re putting in front of them.” If compromise is inevitable, then success depends on how quickly you detect, isolate, and respond. These safeguards come from understanding how attacks actually unfold. In industrial operations, offense wins. Organizations that continuously test, expose, and reduce vulnerabilities don’t wait for a real attacker to do it for them. Essential #2: Zero Trust Protects the Entire Network Dark actors target ICS (industrial control systems) and OT environments. Why? As mentioned in part 1 of this series, industrial infrastructure has evolved rapidly with many more entry points because of today’s ultra-connected world. The cloud, internet and mobile workforce have expanded the attack surface. As a result, attackers don’t look for targets, they look for vulnerabilities. No one is too small or too big. Successful network security strategy means moving beyond legacy perimeter security to dynamic, zero-trust strategies governed by “never trust, always verify.” The goal is to protect the entire network and build resilience against evolving threats so disruptions are eliminated. “A lot of people have been burned without a clear ROI,” Cunningham says. “There’s a unique space around IoT, IT/OT and binary-type applications. OT devices are only supposed to do one or two things and pull up data. The OT space fits well into the strategic side of the equation.” Understanding and knowing what’s going on with your devices is a good start. To Cunningham, security is much bigger than one organization. After leaving the NSA he was assigned a project around zero trust that was already underway at Forrester. He quickly realized that if he was a bad guy, zero trust would have made his life miserable. His thinking around security quickly changed. “I built a framework. I have kids. I really think that in a world where everyone is digital and in a space where we have … access to the internet and all these other things, operating securely is a fundamental human right.” Essential #3: Make Your Network Invisible Through a Zero Trust Mindset Attackers can’t exploit a network they cannot see. Yet, according to Cunningham, there’s a critical step before you get to actual technology tools: embracing a zero-trust mindset so people inside your organization become, well, skeptics. Zero trust is not a single product or model, but a mindset that removes implicit trust from all relationships inside your network. Start with the basics. Define maximum control. What control do you have right now? Where are the gaps? Minimize lateral movement. Do third-parties have access? Does your security allow people to move around easily within your network once they are in? Don’t empower adversaries. Are you thinking offensively? What
The Overlooked Value of Microsegmentation in OT Security

Scott Alldridge, CEO of IP Services, likens microsegmentation to a hotel experience. “You go to the front counter. You present your ID. They authenticate you,” he explains. “They give you a key card. You can go into the exercise center, sometimes a lounge, but you can’t go into other guest bedrooms or the back office. They’re really controlling for a point in time.” Controlling access case by case, he says, restricts “east-to-west” movement within a network. If a breach occurs, the intruder’s ability to move laterally is severely limited. And moving they are. According to The Hacker News, “over 70% of successful breaches involving attackers moving laterally.” This, they say, is causing “organizations to consider rethinking how they secure internal traffic.” Enter microsegmentation and zero trust. Microsegmentation Comes of Age Alongside Zero Trust A regular contributor to Forbes, Alldridge’s passion for technology hails from his high school days where he hid a Commodore 64 underneath his bed in case friends stopped by. At age 19, he started a software company, then reinvented network integration and IT security for MicroAge Inc., a company on the Fortune 500 list the final five years of the last century. Alldridge’s experience comes by way of deep learning through his IT Process Institute, a research organization that studies IT values. One of his chief findings: 70% to 80% of downtime correlates due to unauthorized change, the core battle zero trust is known to win. Microsegmentation, Alldridge points out, is central to zero trust, which takes a “never trust, always verify” approach to eliminating and reducing attacks. Before 2020, he says, perimeter-based security was widely adopted. By 2024, as Alldridge was making his final edits on his 468-page book “The Visible OPS Cybersecurity: Enhancing your Cybersecurity Posture with Practical Guidance” (more than 400,000 copies sold) zero trust was gaining broader adoption. Still, in OT environments, microsegmentation was sorely needed but not exactly wanted. Granular security in an environment requiring 24/7 uptime was perceived as complex and risky. Many industrial devices and systems were not designed with security in mind. Plus, there were legitimate barriers to contend with: the constraints of legacy equipment, patches bridging gaps with modern technology, increased number of devices, and an outdated assumption that operations are off the radar of dark actors. “And so what we’re learning is how to protect those systems,” he says. “Some are SCADA, they’re dated, and a lot of them don’t have the ability to put proper security in place. In a lot of the industrial applications of technology, they’re using third parties to use specific machines, from water pump monitoring devices to CNC machines that cut wood and cabinets to logging and tractors that are in the field. They haven’t thought about the security aspects. Much like we’ve made progress on the electrical grids and the dams and the municipalities to some degree, they’re still working on it, though.” A zero-trust approach, combined with microsegmentation, allows organizations to “apply policies and add procedures … to basically block access, make it impenetrable – unless you allow and open up access to a specific person, individual, a particular network point, or a particular workload or application,” he adds. Used with permission. All Rights Reserved. Microsegmentation Keeps AI in Check While AI has been around since the 1950s, it is now the go-to for many – from the curious retiree to employees using “shadow” AI to write emails and strategic plans to students looking for a good introduction for their research paper. In his Forbes article “How AI Isn’t Just Improving Attacks, But Making Them Continuous.” Alldridge warns of AI’s security risks with the same urgency as Paul Revere’s midnight ride. An excerpt from his article bears why: “By enforcing least privilege communication at the workload, application, and data layer, microsegmentation turns a single compromise into a contained incident instead of an enterprise-wide event. It doesn’t rely on signatures. It doesn’t wait for alerts. It simply makes movement impossible unless explicitly allowed. That’s the key shift: from detection-based defense to architectural containment. When microsegmentation is combined with zero-trust principles, attackers can still get in, but they can’t spread. And in the age of AI, stopping spread matters more than stopping entry.” Alldridge differentiates between generative AI (GenAI) and agentic AI, explaining that while GenAI is popular for creating content, agentic AI refers to intelligent agents capable of autonomous actions within networks. Agentic AI, he says, could identify vulnerabilities, such as open network ports or improperly protected application programming interfaces (APIs), and potentially exploit them. He points out that agentic AI can act quickly, communicating across the network to find and create new breaches or move laterally – that “east-to-west” direction mentioned earlier – within the network. Microsegmentation and zero-trust principles, which both reduce the attack surface and limit the blast radius, counteract AI-driven threats that can create more sophisticated cybersecurity problems. AI agents are “going to be very intelligent,” he explains. “They may see something is open over here and there’s some ports open on the network that should have been shut down on the firewall of the switch or whatever.” If AI sees an application like an API that’s not properly protected, an application interface, or a non-human interface, AI agents could communicate internally, educate themselves, and create a new breach or move quickly east to west along the network. If you think ambitious AI agents sound like science fiction, take a look at this example Alldridge shares. A midsize parts manufacturer recently implemented AI-driven production scheduling and supplier integration tools. In so doing, they exposed several APIs to connect their ERP system to logistics partners and automated warehouse robots. One weekend, an AI agent embedded in a compromised third-party vendor application began scanning internally. Not good. It detected an open management port on a network switch that had been left exposed after a firewall rule change during maintenance. It also found an internal API used for machine telemetry that lacked proper authentication between non-human service accounts. The rogue AI
The Invisible Edge: a Podcast

At the Operational Edge: From Implicit Trust to Zero Trust

The operational edge is like a mirror. It changes depending upon who’s looking at it. The “edge” for a data center located in an “edge metro” might be vast air-conditioned buildings, with racks of servers lined up in neat and tidy rows, situated along busy highways. For a power company, the edge might be a fenced-in substation located in the middle of a subdivision. Water treatment plants at the edge line rivers and, unlike all of the above, the operational edge for oil and gas producers could be floating vessels in the ocean or span hundreds of remote, desert miles. For industrial operations, the edge may be production facilities miles or oceans apart. We sat down with FreeWave’s CEO and founder Steve Wulchin to explore the operational edge through the lens of someone who has contributed to its evolution. A no-nonsense, culture-driven leader, Wulchin’s worldview was shaped by his diverse, Latin America upbringing. With an eye to the open frontier, he helped introduce long-range connectivity in remote places more than 30 years ago. FreeWave’s 900 MHz radios became an industry favorite standard for SCADA systems and industrial networks with no easy access to Wi-Fi. Over a million devices are in use today. Today, Wulchin and his team are taking a new view of the operational edge. “We define the edge as the very edge of the network,” he explains. “It’s remote and, by definition, you have skinny pipes, typically solar powered, so power consumption is a consideration, and it is exposed to extreme environmental conditions.” The challenge, he says, is that the edge has become more connected, triggering a “recent awareness” about the vulnerability of industrial infrastructure. That’s why he and FreeWave’s team of engineers have spent the last year innovating what they call Operational Zero Trust (OZT). “Operational Zero Trust is about applying zero trust to the industrial world – at the geographic and physical edge. We’ve been active in all these places for over 30 years,” Wulchin says. He understands why the edge has often been an afterthought for industrial organizations. IT and OT have long had different goals. Industrial Control Systems (ICS) focused on production, automation, uptime, and worker safety. It came with implicit trust. In contrast, corporate IT was about protecting the enterprise through segmentation so that a breach could not move laterally across the enterprise. OT systems were not built this way. Today, given IT/OT convergence, Wulchin says that zero trust, with its “never trust, always verify” approach, is critical for protecting industrial infrastructure. For CEOs and boards, Operational Zero Trust is a strategic business advantage that delivers supply chain resilience, network security, and an offensive strategy as opposed to a defensive one. Perimeter Security in OT Environments is Outdated and That’s a Strategic Risk“There’s a growing awareness that when you deploy things like IIoT (industrial internet of things) devices and you don’t secure them and they’re connected to the network, then you’ve just introduced a whole new attack surface,” Wulchin says, adding, “Your network is only as strong as your weakest link. These devices offer a vulnerability all the way to the heart of your network.” Case in point: in FreeWave’s recent conversation with Dr. Chase Cunningham, the author and expert known as Dr. Zero Trust instantly brought up 206 fuel tank control systems talking to the internet in real time. Each was a path to that company’s network. Any one company’s vulnerability can even impact the United States’s national security. According to the Cybersecurity & Infrastructure Security Agency website, there are 16 critical infrastructure sectors whose “assets, systems, and networks, whether physical or virtual are considered so vital to the United States that their incapacitation or distraction would have a debilitating effect on security, national economic security, national public health or safety . . .” OT environments and the larger world are inextricably linked. Technology advancement comes with two trajectories: progress and problems. You may recall the connectivity surge of the 1990s when the World Wide Web became the “World Wide Wait.” More connected devices caused latency issues. Broadband solved the problem of the dial-up era – and those connected devices? They continued to increase exponentially in OT environments as IIoT devices like sensors and gateways, OT and IT systems, PLCs, smart equipment, and the cloud got added to what once were self-contained legacy networks. The traditional security approach required patches: Virtual Private Networks (VPNs) and tunneling to protect the growing attack surface. This perimeter-based security led to exposed visible IP addresses, open ports, tunnels, and gateways that answered back when scanned. In OT environments, access grew faster than security. That led FreeWave to explore the applicability of Operational Zero Trust. At first, the team’s goal was to create ironclad security in a redesigned cellular gateway product called FreeWave Elements ES1000™. The gateway was powered by zero trust. “Out of the development process, we discovered we could secure that device and offer broader applications,” said Wulchin. That “broader application” turned out to be the FreeWave Zentry™ solution introduced in 2025. The zero-trust-based solution protects critical industrial assets by design. The security software acts as a security “fabric” overlaid onto OT systems, without ripping and replacing equipment. It makes the network virtually invisible. As Wulchin says, “When it comes to operational technology, the perimeter is constantly moving.” Since you cannot exploit what you cannot see, the Zentry solution repositions OT security from defensive to offensive strategy. The Danger of Operational ApathyIn conversations with customers, Wulchin says that having a false sense of security is the biggest risk of all. “The world is not getting safer from a cybersecurity standpoint with the advent of AI and where that could take us. To a large degree, FreeWave’s tech is highly disruptive and very different from anything being used to protect OT environments right now. It’s more secure, easier to manage, easier to deploy. It’s just a completely different approach.” Wulchin says the Zentry solution protects the network through a variety of means, protocols, and attributes, while
IP Services Joins FreeWave Technologies Partner Program to Strengthen Security for Industrial IoT Operations

Strategic Partnership Combines FreeWave’s Zentry™ Security Solution with IP Services’ Industry-Leading Cybersecurity and Managed IT Services BOULDER, Colo. and EUGENE, Ore. – FEBRUARY 3, 2026 – FreeWave Technologies, Inc., a global leader in Industrial Internet of Things (IIoT) solutions, today announced that IP Services has joined its Partner Program as a strategic technology partner. The collaboration brings together FreeWave’s Zentry™ security solution with IP Services’ fully managed cybersecurity and IT services to help organizations secure mission-critical remote industrial operations. As industrial environments become increasingly connected, organizations face growing cybersecurity risks across operational technology (OT) and remote assets. This partnership enables customers across energy, utilities, agriculture, manufacturing, and other critical industries to deploy secure, reliable connectivity supported by enterprise-grade cybersecurity, compliance, and IT operations management. FreeWave’s Zentry™ solution provides an operational zero-trust security overlay designed specifically for industrial networks. When combined with IP Services’ industry-leading cybersecurity expertise, proven operational methodology, and fully managed security services, organizations gain enhanced visibility, control, and protection across their remote operations. “We are excited to welcome IP Services to our Partner Program,” said Mike Tate, Chief Operating Officer and SVP of Sales and Marketing at FreeWave Technologies. “Their expertise in cybersecurity and managed IT services makes them an ideal partner for organizations that must protect remote industrial systems while maintaining reliability and compliance.” “Industrial systems are increasingly targeted by cyber threats,” said Scott Alldridge, CEO of IP Services. “By combining FreeWave’s industrial connectivity and security solutions with our managed cybersecurity services, organizations can confidently deploy remote monitoring and automation while maintaining strong security and operational discipline.” Together, FreeWave and IP Services deliver a comprehensive approach to securing industrial IoT environments; helping organizations reduce cyber risk, improve resilience, and protect critical infrastructure. For more information, visit www.freewave.com or www.ipservices.com About FreeWave TechnologiesBased in Boulder, Colorado, FreeWave Technologies has connected the unconnected for over 30 years with a reliable ecosystem of edge intelligent radios and solutions – manufactured in the United States – to optimize innovations for remote industrial operations. FreeWave is a global IoT full-solution manufacturer specializing in edge computing devices and applications, now leading in Operational Zero Trust providing robust zero-trust based Zentry™ security overlay to protect networks as well as the assets within them. With hundreds of thousands of industrial radios deployed worldwide, FreeWave serves customers across energy, utilities, agriculture, government, water/wastewater, and other critical industries. FreeWave’s solutions are designed to perform in near-impossible conditions, delivering secure, reliable connectivity and data access organizations need to drive informed business decisions. For more information, visit www.freewave.com About IP ServicesFounded in 2001 and headquarters are based in Eugene, Oregon, IP Services is an industry leader in cybersecurity as a MSSO (Managed Services Security Provider) we specialize in protecting business-critical systems and applications. IP Services delivers leading edge full stack cyber technologies and AI cyber solutions based on Zero Trust principles. IP Services cybersecurity and managed solutions are integrated with our 24X7 SOC services. From our patented penetration testing services to our privately owned Tier III – SOC 2 Type II audited datacenter that hosts our private and hybrid cloud solutions and our infrastructure management systems, disaster recovery services to keep our clients operating in high-risk and regulated environments. IP Services is a co-founder of the IT Process Institute (ITPI) and creator of the VisibleOps® methodology book series that has sold over 350,000 copies and the Visible Ops Cybersecurity book is an Amazon bestseller. Visible Ops is a widely adopted framework for IT and operational excellence. With more than two decades of experience serving organizations nationwide, IP Services helps clients reduce risk, improve resilience, and transform IT and security into strategic business advantages. For more information, visit www.ipservices.com Media Contacts: FreeWave Technologies Sue Moore 303.381.9205 [email protected] IP Services Chris Butler 866.699.6095 [email protected]
Stranger than Fiction: Exploring the New Battlefield at the Industrial Edge with Chase Cunningham (Part 1)

“This is the world we all know and love. But there is a darker side to it all . . .” This opening line is from “The Cynja: Volume 1,” a graphic novel about the risks of our digital world. FreeWave sat down with its author, Dr. Chase Cunningham. When not writing fiction, the retired U.S. Navy Chief helps organizations adopt both a zero-trust policy and mindset to author a brighter, safer future. Fortune 500 companies, small businesses, startups, the media, and the U.S. government rely on Cunningham to win the war on cyber. Because while zombies, worms, and botnets may be the work of fiction, the truth, as Mark Twain once said, is far stranger. The Edge is Exposed Cunningham would like to be out of a job. That would mean the world is safe, devices are designed battle-ready, and people are invincible to cyber threats. This is not likely to happen in the near future. “Do you have a statistic to show how at risk we are?” we asked. “I can do you one better, I’ll show you.” That’s when Cunningham tap, tap, tapped on his keyboard, pulling up examples of vulnerabilities in under 30 seconds. It got real, real fast. His black screen lights up with cascading white lines of IP addresses like a scene from an Ironman movie. “These are IT/OT devices. I could breach these folks,” he says casually. “I’m looking at about 206 fuel tank control systems that have gas in the tank.” Travel centers in Dallas, Texas, and New Haven, Connecticut, are on the list. There are gas stations in Georgetown, Virginia. “Those are things that should be fixed and should be isolated. But they’re literally talking to the internet.” Except, they shouldn’t be talking to the internet. Devices and equipment at the edge include wind turbines, water systems, airline systems, and fuel stations. Each, he points out, is a path to corporate, a path to data access, a path to cyber risk. A regional airline booking system is connected to a larger enterprise. Gas stations are connected to global oil and gas companies. The edge is an entry point to a much larger landscape. “Do you really understand how vulnerable we are?” he asks. “. . . an OT/IT, IoT device, people bring them in and plug them in. Who’s holding the bag? If you’re on the internet, it’s an issue for you.” The Case for Zero Trust at the Edge Cunningham has long held a front row seat via senior security and analyst roles at NSA, CIA, FBI, and other government agencies. At Forrester, he pioneered the firm’s Zero Trust eXtended framework. He holds six patents and is the international best-selling author of “Cyber Warfare – Truth, Tactics, and Strategies.” According to a LinkedIn post in early 2025, his podcast The Dr.ZeroTrust Show hit 250,000 listeners on Spotify. At FreeWave, we know zero trust keeps the industrial edge safe. That’s why we’ve introduced Zentry™, a disruptive new technology for industrial operations in the field. Our customers have operated on the edge – from acres of oil fields to water treatment plants to remote agricultural regions – for more than 30 years. During that time, the attack surface has grown alongside the rise of IoT devices. Edge vulnerabilities are sometimes overshadowed by operational stability and legacy equipment not originally designed for modern security concerns. Bringing zero trust to the edge means applying the core zero-trust principle to edge devices and equipment: “never trust, always verify.” While seemingly straightforward, Cunningham says that if you asked 100 people in a room to define zero trust, 99 would take different approaches. Who better, then, to define zero trust than the doctor himself? “In the context of zero trust, there are things in my network or things in my infrastructure that have got default (settings) and are able to do things because they came from the manufacturer that way, especially OT.” He says it’s not a good idea to just turn things on, cross your fingers, and hope that everything goes the way that it’s supposed to. The core of zero trust for operational leaders is to remove trust inside the network. Since OT/IoT devices on the edge are designed for specific functions, they are well-suited for zero-trust security models. “OT, IoT, all these kinds of smart technology things that are coming online now, they’re supposed to be kind of binary in nature, right?” Think of a home thermostat. Its job is to relay temperature much like a sensor monitoring extreme temperature during oil drilling. Neither device should be sending packets of data elsewhere or inviting dark actors in. “If there’s any one area I think you can apply zero trust to, carte blanche, it is OT,” says Cunningham. Zero Trust and Control Zero-trust principles such as segmentation and isolation make it simpler to define what behaviors are expected and quickly spot anomalies. In the OT space, controls limit what these devices can do and who or what they can communicate with, reducing the risk of lateral movement by attackers and limiting the blast radius if a breach does occur. He says that managing OT and IoT environments with policy engines and automation, rather than relying on manual processes, further strengthens security and makes zero trust both practical and valuable. The goal: no dark corners, nothing unexpected, and no empowering the bad guy. Cunningham offers up an example that underscores the complexity and interconnectedness of modern OT/IoT environments and the importance of having policy controls for all connected assets. On one floor of a small factory, machines move things around. Others create products. The machines are on-site with standard infrastructure controls around them. However, another building outside is run by a third-party that produces specific parts for the manufacturing line. Those operational processes must be networked together. The scenario is familiar to anyone in operations.
7 Reasons OEMs Are Adopting Security by Design Early in the Product Development Life Cycle

In today’s world, every CEO, CIO, CSO, or CFO is liable for compliance and failing “Pen Testing” (penetration testing) scores, not to mention rising insurance premiums. The pressure of thwarting the increasing security breaches and hacks demand a robust solution that lowers costs and increases network security without navigating complex solutions from multiple vendors. So what is the value proposition of adding security to an OEM’s device early in the product life cycle? “If you were just offering a communications device before, you could be looking at increased network security through the same lens as everyone else,” said Michael Tate, chief operating officer and senior vice president of global sales and marketing for FreeWave. He adds, “The outcomes transform commodity-priced hardware into a differentiated solution.” “Today you are selling hardware and tomorrow you are selling a valuable solution with ARR, all while becoming more relevant to your customer and solving real security problems over just connectivity. If you have devices that give you security and also include communications, you’re going to win faster.” “If you have devices that give you security and also include communications, you’re going to win faster.” – Michael Tate, chief operating officer and senior vice president of global sales and marketing for FreeWave For OEMs, proactive threat detection starts with zero trust. Zero trust ensures every interaction is verified and that OEM products are trustworthy. OEMs and Preparing for the Future The importance of cybersecurity extends to our readiness as a nation. Thousands of OEMs contribute to the U.S. defense industrial supply chain across 16 critical infrastructure sectors. According to the U.S. Department of Defense Cybersecurity Strategy, the first of its kind in the country’s history, ensuring our safety means having “a cybersecurity framework built upon zero trust principles.” As a network is continuously monitored, a zero trust security approach gives systems administrators time to focus on highest-risk items and stay ahead of threats. The Department of Defense has committed to fully deploy zero trust by the end of 2027. The demands for OEMs to address security are rapidly evolving. Secure by Design is a principle that prioritizes security early in design rather than leaving it as an afterthought. Industrial sectors like oil and gas, energy, municipal water, and wastewater departments use thousands of devices across a network. These assets have multiple contracts and multiple vendors. A disgruntled employee or third-party vendor has the potential of seeing everything and doing serious damage with traditional security. Yet, a minute of downtime can cost millions. Take North America’s largest steel producer, $30 billion Nucor, as an example. Its data breach in May 2025 due to “unauthorized third-party access” triggered shutdowns at multiple facilities. As IT/OT integration grows, the Nucor data breach underscores how cyberattacks are growing in sophistication right along with the attack surface, which includes IIoT devices, communications, gateways, sensors, robotics, industrial routers, PLCs, and wireless access points. Security, it turns out, is everyone’s concern, especially forward-thinking OEMs of industrial-grade networking hardware and edge devices like cellular routers, gateways, and modems. Secure by Design products give OEMs differentiation in a crowded marketplace. FreeWave Offers OEMs Competitive Advantage FreeWave has committed more than 30 years to developing industrial wireless solutions. Today, its end-to-end IIoT solutions transform connectivity, security, edge intelligence, and data insights for remote industrial enterprises around the world. OEMs with small, niche markets to mass-produced industrial-grade products successfully embed FreeWave solutions in agricultural products, automation technology and edge devices. The FreeWave Zentry™ solution is a zero-trust based security solution. It cloaks protected networks, making them “invisible” utilizing a simple concept: never trust, always verify. This means the system doesn’t automatically trust anyone or anything trying to connect to it – even if they’re coming from inside the network. Instead, every access request attempting to access resources is verified whether from a user, device, or application, no matter where they are. Here are seven reasons OEMs are addressing security early in the product development life cycle and how the Zentry solution impacts outcomes for both OEMs and their customers. Differentiation in a Commodity MarketThe Zentry solution allows OEMs to stand out by embedding advanced network security directly into their products, moving them beyond commodity hardware and giving them a unique selling proposition. This makes their offerings more relevant and valuable to customers, helping them pull away from competitors who only provide standard connectivity features. Simplified and Consolidated SecurityBy integrating the Zentry solution, OEMs offer consolidated network security as part of their product, eliminating the need for customers to manage separate VPNs, static IPs, port forwarding, and multiple vendors. This reduces complexity, points of failure, and administrative overhead for OEMs and their end customers. Increased Network SecurityThe Zentry solution provides a zero-trust overlay, making devices and networks “invisible” to unauthorized users. It encrypts communications, limits access strictly to what’s needed, and reduces the attack surface – key for critical infrastructure and remote assets. This is especially valuable as cyber threats and ransomware attacks increase across industries. Improved ROI and Lower Total Cost of OwnershipWith the Zentry solution, OEMs and their customers reduce costs by eliminating unnecessary hardware, software, and ongoing maintenance. The solution is aggressively priced, easy to deploy (setup in minutes), and intuitive to manage, making it accessible even for organizations with limited IT resources. Flexibility and Broad CompatibilityThe Zentry solution can be installed on any device with a Linux environment, including cellular gateways, inexpensive Linux boxes, laptops, tablets, and servers, making it broadly compatible with existing OEM hardware and easy to integrate into diverse product lines. Multi-Tenant Management and ScalabilityThe Zentry console is multi-tenant, allowing OEMs to manage security for their own products and for their customers, supporting SaaS and managed service models. This enables new revenue streams and value-added services. Future-Proofing and Market RelevanceAs security becomes a top priority for buyers, OEMs embedding the Zentry solution are better positioned for the future, offering solutions that address both current and emerging threats, and aligning with the industry’s shift toward integrated, secure, and
A Network is an Ecosystem: Rethinking Security for OEMs

In a recent conversation with Anthony Besett of GetWireless, a metaphor emerged: a network is not just a collection of devices, but an ecosystem. The line is as catchy as it is directional: original equipment manufacturers (OEMs), a foundational contributor to global supply chains, have a growing responsibility for securing today’s interconnected environments early in design. How did we get here? Well, we live in a connected world. According to IoT Analytics, which tracks and analyzes IoT connectivity, the number of connected IoT devices will grow 14% by end of 2025, reaching 39 billion in 2030 and more than 50 billion by 2035. That’s six devices for every single person on earth. Another way to frame this: 73.2% of the world’s population accesses the internet. A parade of innovative technologies have arrived: artificial intelligence (AI) infrastructure, hyperscalers (developers scaling data center networks), quantum computing, and the data center surge. Deloitte ranks “cyber and/or physical security concerns” as number three on its list of data center infrastructure challenges, tapping OEMs on the shoulder to take note of technology’s evolving impact. Besett serves as Vice President OEM Embedded Solutions for GetWireless, a leading value-added distributor of cellular solutions like intelligent gateways, servers, asset trackers, modems, and other solutions for IoT applications. Besett predicts that OEMs focusing only on designing, making, and selling products may be shortsighted. IoT devices are increasing and networks are becoming more complex. The stakes for robust, holistic security have never been higher – and OEMs recognizing that their products are responsible for the entire network ecosystem will be the ones to differentiate their product. Intentional security for OEMs is a bold leap forward for customers. Beyond Silos: A Network as a Secure Ecosystem Besett emphasized that traditional approaches to security often focus on isolated components, protecting a gateway here or running penetration testing (pen testing) there. He says, “We have to be paying attention to security across the entire infrastructure, not just one piece of it. Historically, you’ve seen there’s attention to one piece.” Many of GetWireless’s suppliers do pen testing, for example, but Besett sees that changing in the future with security-minded solutions that are guaranteed to protect networks and all the devices that go beyond that point. Here’s why: in an ecosystem, every element is interdependent. A vulnerability in one device – like a sensor, workstation, or camera – threatens the health of the entire network. Just as the rapid spread of Dutch Elm Disease endangers a forest, a single weak link in a network can compromise an entire digital environment. As an example, consider the Mars Hydro breach. The China-based maker of LED grow lights had 2.7 billion records exposed, including passwords, IP addresses, and device IDs, all because the attacker was in Wi-Fi range. OEM manufacturers have an opportunity to help mitigate the risks of IoT data breaches. Besett shares, “I was in a conversation not too long ago where a customer’s whole network was hacked because somebody plugged into a gateway that wasn’t controlled. And so now you’ve got a hole. There are lawsuits. It’s going to be a mess.” He says fragmented security leaves the entire network ecosystem exposed. The takeaway for cybersecurity: silo thinking is risky when it comes to individual OEM network products. A piecemeal approach is no longer sufficient. Zero Trust Security and Zentry Besett points out the value of zero-trust architectures, such as the FreeWave Zentry™ solution. Referencing back to his customer example, he explains, “There were vulnerabilities there that if something like Zentry was on that, that wouldn’t have happened because they (the attacker) would have actually had to request access.” “The devices on the edge, sensors, the workstations, the PCs, the tabs, the LPRs, all those different things, they get security as well. And it’s really cool because Zentry controls who has access, when they have access, and exactly what they have access to. What’s so unique about Zentry and their kind of ‘look’ on the infrastructure is . . . giving the control to an OEM to be able to secure everything for their customers, not just one piece.” Security must extend to every part of the network ecosystem, he says. It’s not enough to lock the front door; every window, back door, and fence line needs protection. The FreeWave Zentry solution secures not just one component but the entire deployment by making the attack surface invisible – there are no public IP addresses, open ports, or static tunnels to scan or exploit. Ephemeral sessions mean access appears only when needed and disappears when complete, leaving no standing exposure. Deterministic control removes noise, helping small security teams focus on real threats without wasting time on no false positives. Besett explains, “Zentry controls who has access, when they have access, and exactly what they have access to.” This Identity-driven access ties every connection to a verified user, device, and policy for precise control. Devices, from license plate readers to medical wearables, become ubiquitous and integral to securing critical operations. At GetWireless, Besett says the company looks at the entire connected world, including body wearing devices, POS machines, monitoring cameras, and weather stations. “We’re engaged at all those different levels in the community,” he says. Security, according to Besett, is no longer a “nice-to-have” but a fundamental requirement for any device that connects to a network. He notes, “Do you want to be the hole in the network that creates the problem for a customer or brings down a network?” The risks are real, from lawsuits to national infrastructure threats. Zero trust gives OEMs an opportunity to proactively address vulnerabilities at every layer, not just at the gateway or a single device, but across the entire ecosystem. What OEMs Need to Know About Zero Trust Security is poised to become a differentiator in the marketplace. With many devices becoming commoditized, Besett suggests that embedding zero trust could set OEM network products apart. Besett asks a good question: “Why would you choose a device that doesn’t meet
FreeWave Technologies Welcomes Cybersecurity and AI Industry Specialist to Lead Security Offerings

November 12, 2025 – Boulder, CO FreeWave Technologies, Boulder, CO is pleased to announce that Andrew Livingston has joined the team as Senior Solution Sales Engineer. This strategic hire underscores FreeWave’s commitment to expanding its market presence and delivering enhanced Industrial edge security solutions, like its FreeWave Zentry™ zero-trust based offering to customers worldwide. Andrew will leverage his advanced knowledge and expertise to help organizations increase their network security with Zentry while securing their infrastructure assets. His appointment comes at a pivotal time as industries increasingly recognize the critical importance of robust security measures for connected industrial systems. “We are thrilled to welcome Andrew to the FreeWave team,” said Michael Tate, COO and SVP of sales and marketing. “His unique combination of cybersecurity and artificial intelligence expertise along with his technical solution understanding positions him perfectly to help our customers navigate the complex security landscape. As industrial connectivity continues to expand globally, having leaders like Andrew on our team ensures we can deliver the sophisticated, secure solutions our customers demand.” Andrew brings more than a decade of deep experience in governance, risk, and compliance (GRC) and data security posture management (DSPM), with a proven track record in turning complex cybersecurity frameworks into measurable business outcomes. His educational background includes a Master of Science in Artificial Intelligence and a Master of Science in Project Management, providing him with both the technical depth and strategic perspective necessary to address today’s industrial security challenges. The FreeWave Zentry solution creates an invisible security layer that eliminates the attack surface. Embedded in the Elements™ ES1000 Zentry security provides just-in-time connections to only those access requests that are authorized. This reduces operational risks, cuts license costs and meets Zero Trust mandates (CISA/NIST) with a single solution. Together, they create a temporary, invisible, and secure link that vanishes once the task is complete, leaving no doors open. FreeWave Technologies continues to lead the industry in helping critical infrastructure automate and connect securely at the edge by providing critical data and connectivity solutions for industrial applications. Andrew’s addition to the team reinforces the company’s position as a trusted partner for organizations seeking to securely connect and monitor their critical infrastructure. About FreeWave Technologies FreeWave continues to transform industrial communication with more than 30 years of proven, proprietary radio technology deployed in the world’s most demanding environments. We deliver open-standards wireless networks, AI-powered edge applications, and an integrated cloud platform that’s secured by FreeWave Zentry zero trust architecture. From traditional telemetry to advanced edge AI and autonomous systems, FreeWave empowers you to secure the entire data lifecycle, from collection to monetization. Backed by a strong IP portfolio and global partnerships, we’re built for the future of industrial intelligence Contact: Sue MooreVP of MarketingFreeWave [email protected]


