FreeWave Technologies Unveils Zentry™: Enhancing Secure Connectivity for Industrial IoT with Zero Trust Architecture

June 27, 2025 – Boulder, CO FreeWave Technologies, a leader in industrial IoT connectivity, announces the launch of Zentry™, a robust zero trust security solution designed to strengthen edge asset connectivity. Available as an embedded feature within FreeWave’s Elements® ES1000 portfolio or as a standalone solution, Zentry delivers advanced cybersecurity for industrial and enterprise IoT networks, addressing rising threats like endpoint vulnerabilities, system disruptions, and data breaches. Built on the “never trust, always verify” principle, Zentry uses zero trust architecture to secure networks of any size or complexity. Unlike traditional perimeter-based defenses, Zentry authenticates every user and device at every connection point, reducing vulnerabilities and containing potential threats with precision. “Zentry shifts cybersecurity from reactive to proactive,” said Richard Reisbick, CTO of FreeWave Technologies. “Imagine a fortress where every entry requires real-time verification. If a threat emerges, it’s isolated instantly, unable to spread. Zentry assumes risks are ever-present and stops them effectively, enabling businesses to operate securely in today’s challenging digital landscape.” Key Features of Zentry Zentry provides practical, scalable, and user-friendly security tailored for industrial IoT environments: Never Trust, Always Verify: Every access request undergoes strict authentication, ensuring no user or device bypasses scrutiny, whether inside or outside the network. Least-Privilege Access: Permissions are dynamically assigned and monitored, granting only the minimum access needed to prevent unauthorized actions. Microsegmentation: Networks are divided into secure, isolated zones, containing breaches and minimizing their impact on critical operations. Streamlined Management with Zentry Console The Zentry Console, integrated into the FreeWave Data Platform, offers clear visibility and control over Zentry-protected devices. Key capabilities include: Real-Time Device Management: Revoke credentials or adjust permissions instantly from anywhere. Custom Device Identification: Define devices with tailored naming conventions for improved clarity and control. Permission-Based Triggers: Automate and customize management actions to meet your organization’s specific needs. Zentry integrates seamlessly with external Identity Providers (IdPs) and JWT systems, supporting “zero touch” deployments and compatibility with existing identity frameworks. By authenticating connections before they reach the network’s Policy Enforcement Point (PEP), Zentry neutralizes traditional attack vectors, ensuring strong protection for distributed assets. Addressing Critical Cybersecurity Needs Zentry arrives at a crucial time. Industrial control systems face increasing cyberattacks, with potential losses in millions per incident. The European Union’s Cyber Resilience Act (CRA) mandates strict cybersecurity for connected devices, while the U.S. Department of Defense targets full zero trust adoption by 2027 across 16 critical infrastructure sectors, including energy, utilities, and agriculture, all key markets for FreeWave. “Cyber threats are a daily reality,” Reisbick noted. “Zentry enables organizations to meet regulatory requirements, protect critical operations, and stay resilient in a connected world.” Strengthened by Strategic Partnerships In collaboration with NetFoundry and Keyfactor, FreeWave has tailored Zentry to deliver edge-optimized security for remote networks with distributed assets. This partnership ensures Zentry is a scalable, reliable solution for industries like energy, agriculture, and defense, where secure connectivity is essential. Why Choose Freewave Zentry for your Remote Networks? Robust Security: Protect your IoT ecosystem with a zero trust framework that adapts to modern threats. Seamless Integration: Leverage existing infrastructure for quick deployment and minimal disruption. Scalable for Any Network: From small operations to global enterprises, Zentry delivers tailored security without complexity. Regulatory Compliance: Meet requirements with confidence. About FreeWave TechnologiesWith more than 30 years of expertise, FreeWave Technologies is a global leader in industrial IoT solutions, delivering reliable, secure connectivity for mission-critical applications. From energy to agriculture to defense, FreeWave enables industries to succeed in the digital era with advanced technology and deep expertise. Contact: Sue MooreVP of MarketingFreeWave [email protected]
FreeWave Launches Elements® ES1000 with FreeWave Zentry™ Powered by Zero Trust: Solving Secure Remote Networks

June 27, 2025 – Boulder, CO – FreeWave Technologies, Inc. is changing the dynamic of remote network security with the launch of its Elements ES1000 networking device powered by the FreeWave Zentry, zero trust framework. This combination eliminates the vulnerabilities of static IP addresses, delivering unparalleled security and seamless connectivity for critical infrastructure operations. Designed to protect and secure remote assets, the ES1000 with Zentry sets a new standard for IIoT network security, addressing the evolving needs of field crews, IT/OT managers, and C-suite leaders. A single breach can lead to compromised data or devastating and expensive downtime, risking regulatory penalties and damage. Traditional solutions like firewalls or VPNs fail to fully mitigate these risks, as static IPs remain discoverable and exploitable, especially in distributed ecosystems with aging equipment. FreeWave’s solution makes networks essentially invisible to the world while also simplifying how companies setup remote connections. The ES1000 is a rugged networking device and cellular gateway with an embedded zero trust framework that strengthens your network’s security. By enforcing continuous authentication, microsegmentation, and end-to-end encryption, it ensures that every network connection, whether to a pump, valve, robot, sensor, or PLC, is verified and isolated, eliminating the need for static IPs altogether. Data never touches the public internet, and granular access controls prevent lateral movement. This approach aligns with stringent standards like NIST 800-207, IEC 62443, and NERC CIP, ensuring compliance without complexity. Key Features and Benefits of the new FreeWave solution Simplified Management: FreeWave Zentry Console on the FreeWave Data Portal provides a single-pane-of-glass for real-time management, visibility and control of connected devices further optimizing operations. The ability to define devices with custom naming conventions takes IP or device ID differentiation one step further. Embedded Zero Trust Security: Continuous verification and micro-segmentation lock down every endpoint, eliminating static IP exposure and reducing breach risks. Optimized for the Edge: FreeWave designed this combined solution to work in remote locations with heavy intelligent edge-compute requirements. Unlike other solutions, the ES1000 with Zentry provides robust, rugged and reliable connectivity in the harshest environments. Global Connectivity: A single global SIM with automatic carrier switching ensures reliable, cost-effective, low-latency connections for fixed and mobile assets, from rural oil fields to urban grids. Rugged Reliability: Built for harsh environments (-20°C to 70°C), the ES1000 delivers reliability and edge-computer power with quad-core A53 hardware for compute-intensive applications. The ES1000 with Zentry has already proven its value in real-world applications. An operations director at a leading energy firm shared that they, “put the device through the rigors in several different environments and various applications and, it just works.” Steve Wulchin, CEO of FreeWave Technologies, emphasized the strategic impact: “In an era where cyber threats target static IPs and disrupt critical operations, the ES1000 and Zentry deliver a fortress-like solution that empowers industries to scale securely and efficiently. This is more than a product, it’s a commitment to protecting our customers’ critical infrastructure and assets from the field or the boardroom.” FreeWave Technologies has set a new benchmark in IIoT security and connectivity with the launch of the Elements ES1000 device. By eliminating the long-standing vulnerabilities of static IP addresses, this innovative solution delivers robust, end-to-end protection and seamless global connectivity for industries reliant on remote operations. About FreeWave Technologies Headquartered in Boulder, Colorado, FreeWave Technologies has been a pioneer in industrial wireless solutions for over 30 years. Committed to delivering reliable, secure, and innovative connectivity, FreeWave empowers industries to optimize operations and drive efficiency through advanced IoT solutions. Contact: Sue MooreVP of MarketingFreeWave [email protected] FreeWave Elements® ES1000 Copyright FreeWave Technologies. Use prohibited without permission.
Are Static IPs a Liability in the Industrial Space? Or Are You As Protected as You Think?

Actor John Krasinski plays Jim Halpert in The Office. Jim’s one-liners pave his pursuit of a fulfilling sales career at Dunder Mifflin, a paper company. (Example: I am about to do something very bold in this job that I’ve never done before: try.) Spoiler alert: Krasinski becomes one of the company’s top salespeople. That’s what human beings do. We evolve. So does technology. Today, industrial internet of things (IIoT) data demands devices that are dynamic because, like Krasinski’s character, networks are continuously evolving. The goal? Make your network and devices resilient. In this blog, we’ll explore the number one problem for cellular network industrial users, what you should know about static and dynamic IP (Internet Protocol) addresses, how they impact network security, and a true story of how we hacked into a customer’s network – during a meeting with them. ——————————————————————————–—- What are Static and Dynamic IP Addresses? Why Should You Care? Let’s start with the basics. An IP address is a string of numbers identifying each device connected to a network. The Internet Service Provider (ISP) assigns the unique device “name” allowing it to: Be recognized by the network (hey, I see you) Communicate with other devices (let’s talk) Historically, industrial devices use static IP addresses. From web servers to sensors to VPNs, these addresses are fixed. They never change. It’s kind of like living at the same house address all your life – when people know where you live, they can send you whatever mail they want, whenever they want. In contrast, dynamic IP addresses get assigned a unique address by the Dynamic Host Configuration Protocol (DHCP) server. Every time a router reboots or the system changes or said device is not in use, the device’s IP address changes. In this case, imagine living in Paris one day and Milan the next. With no one knowing your address, you are free from receiving junk mail forever. In the Age of Connectivity – where devices, data, and business scenarios are constantly in flux – are static IPs a liability for industrial users? Why do Industrial Companies Use Static IP Addresses? In short: dependable network access. Businesses need consistent destinations for sending data and a stable address to connect to. Dynamic IP addresses, which shift over time, complicate this process. For a clearer picture, think of how tricky your search for information would be if Google’s website address kept changing. While consistency has been the reasoning behind static IP addresses, technology has evolved – and so has cyberattacks. The vulnerability of static IP addresses now outpaces their original usefulness. Unidirectional vs. Bidirectional Integration Most cellular devices are designed with unidirectional integration where information travels one way. For industrial users, this means data from the edge travels to the world. Many cellular devices are not factory-equipped with a bidirectional, or two-way, data path. A garage door sensor with unidirectional data, for instance, only gets you so far. If you put your bike away, but forgot to close the garage door, an alert notifies you. It’s now Sunday morning so you’re home and can close it as you get your morning coffee going. It doesn’t work, though, if you’re on a flight to Turks and Caicos (although an open garage door probably wouldn’t ruin your vaca). A better way would be an app where you click a button and close the door, and it’s confirmed on your phone. This way, you have a secure home no matter where you are. The same scenario holds true for industrial use cases. Bidirectional data allows you to turn devices – like pumps, drives and machinery – on and off to prevent failures and save time driving to remote places. What is the cost of an oil spill for an hour or productivity loss because machinery is down or, most importantly, equipment failure that triggers unsafe conditions? Devices with bidirectional integration lead to greater data accuracy and data accessibility across the enterprise. In a connected world, data democratization gives people insight to make smarter decisions and be more productive. For example, when a project manager and a safety engineer access the same real-time data, rather than work in data silos, system integration creates more efficient workflows. Shared data, connected “things,” and different platforms work together. Cellular devices with a bidirectional data path help integrate a project management platform with safety data. Imagine watching an HMI (human-machine interface) screen to monitor a pump’s pressure, temperature, flow rate and vibration. The screen flashes red, indicating high pressure and overheating. You’re able to hit the off button, eliminating a potential explosion. Every second counted and with bidirectional data, you averted disaster. Think of it this way: unidirectional data brings “problems” to you with no simple button to fix them. Stressful. Bidirectional data brings “problems” to you and the ability to solve those problems. Peaceful. One solution, however, begets more issues. At each end of the connection, there is an IP address or, put another way, a fresh opportunity to hack your network. Top Concern: Security Breaches Have you ever had a conversation involving IoT where security wasn’t part of the discussion? The answer, most likely, is no. With the continued rise of IoT devices on the network, the news platform Sci-Tech Today estimates that around 33% of attacks on IoT devices may impact critical operations, followed by 32% lack of skilled personnel to implement IoT security. Dynamic IPs can create greater network resilience because they simplify network administration and they typically experience fewer errors. Two words: be prepared. In our view, security is the biggest concern associated with IP addresses. Static IP addresses are easily trackable (after all, they always stay the same). Hackers can more easily compromise them and move horizontally across the network to target other digital assets. This is one reason why security is more than an IT problem, it’s a leadership concern. Find out why network security matters to C-suite executives. Read the blog. After more than 30 years working with remote industries, we believe in security-first design
FreeWave Technologies Unveils ZumEdge® ZU1100: The Ultimate Wire Replacement Solution for Industrial IoT

Boulder, CO – April 29, 2025 – FreeWave Technologies, a leader in industrial wireless solutions, proudly announces the launch of the ZumEdge ZU1100, a bi-directional wire replacement solution designed for efficiencies in industrial IoT deployments. Engineered for unmatched reliability, the ZumEdge ZU1100 eliminates the constraints of traditional wired I/O systems, delivering cost-effective, scalable, and efficient automation for industries worldwide. The ZumEdge ZU1100 leverages a powerful 900 MHz wireless platform to provide real-time, bi-directional data transfer without the need for cumbersome wired infrastructure. With true plug-and-play functionality, this innovative solution is pre-configured for rapid deployment, minimizing setup time and operational complexity. Whether monitoring remote assets or optimizing automation, the ZumEdge ZU1100 ensures industrial-grade performance across critical applications, including oil and gas, water management, utilities, SCADA, and municipal operations. Key Features of the ZumEdge ZU1100 Effortless Wire Replacement: Seamlessly replaces wired I/O with high-precision analog and digital signal transfer, ideal for environments where wiring is impractical. Bi-Directional I/O: Supports analog (4-20 mA) and digital inputs/outputs for comprehensive monitoring and control. Long-Range Connectivity: Operates at 902-928 MHz with a fixed 1W output, achieving up to 60 miles of clear line-of-sight communication. Rugged and Reliable: Built for harsh environments with an operating temperature range of -40°C to +75°C and Class 1, Division 2 safety certification. Cost Savings and Scalability: Eliminates expensive wiring and maintenance costs while offering flexible network expansion to meet evolving operational needs. Remote Management: Enables real-time monitoring and control from anywhere, enhancing productivity and operational efficiency. Built for Industrial Demands The ZumEdge ZU1100 is designed to meet the rigorous demands of modern industrial applications. From multi-well pad sites and underground storage in oil and gas to lift stations and groundwater monitoring in water management, this solution delivers secure, reliable wireless performance. Its compact design and low power consumption make it a versatile choice for diverse industries. “Traditional wired I/O systems are costly and limit scalability,” said Michael Tate, COO and SVP of Sales and Marketing. “With the ZumEdge ZU1100, we’re empowering industries to ditch the wires and embrace a smarter, more connected future. This solution combines cutting-edge wireless technology with edge computing to deliver unparalleled flexibility and efficiency.” FreeWave ZumEdge ZU1100 Wire Replacement About FreeWave Technologies Headquartered in Boulder, Colorado, FreeWave Technologies has been a pioneer in industrial wireless solutions for over 30 years. Committed to delivering reliable, secure, and innovative connectivity, FreeWave empowers industries to optimize operations and drive efficiency through advanced IoT solutions. Contact: Sue MooreVP of MarketingFreeWave [email protected]
Is Less More? How One SIM from FreeWave Streamlines IIoT Data for Global Hybrid Networks

Listen to the blog SIMs and Asset Management SIM (Subscriber Identity Module) cards debuted in the 1990s, the era of Beanie Babies and grunge. Along with changing styles and tastes (thankfully), SIM cards have evolved. Modern SIMs have a smaller footprint (from credit card to paperclip size) and larger capacity at a time when industrial internet of things devices (IIoT) are steeply rising. Also, the embedded SIM (eSIM) option is the “easy button,” delivering full-on network connectivity plus scalability for original equipment manufacturers (OEMs). SIM cards allow data to travel over the internet to and from connected remote assets in the field: sensors, regulators, battery-operated solar systems, water tanks, as examples. The goal? Uninterrupted, secure cellular and satellite connectivity in remote environments. Yes, the humble SIM is the linchpin for keeping data in play. When it comes to asset management, these little chip cards carry a heavy load. Is managing multiple carriers across hundreds or thousands of SIMs, however, becoming a house of cards for global industrial operators? Could using a single SIM instead of many save money and time? How does that impact the demands of global hybrid networks? Will one SIM perform in near-impossible conditions? Could a single SIM make smart products smarter for OEMs? In this blog, we’ll share what we’ve discovered in global IIoT deployments that close the connectivity gap using satellite, cellular, and Wi-Fi so real-time data stays in play. Legacy LTE Connectivity Model for IoT is Yesterday’s Story A quick look back reveals how we got here. For the past two decades, high speed data transfer used Long Term Evolution (LTE) for 2G, 3G, and 4G. LTE started with a single provider in a one-to-one relationship model. Then came virtual private networks (VPNs), gateways and devices all connecting to enterprise on-prem. Tier one mobile network operators (MNOs) took a page from gerrymandering politics, quickly marking their wireless cellular territory. North America is a great example. You go to AT&T® for the regions not covered by Verizon® or vice versa. Suddenly, you have another vendor to manage. And another. And another. Now, overlay that around the world. Dizzying, we know. As those one-to-one relationships with carriers multiplied, operational expenses and costs go up. FreeWave’s VIoT-Flex Consolidates Multiple Carriers with One SIM It’s your day off. Time to pay personal bills. A steaming mug of coffee and laptop await your attention. Wouldn’t it be nice to hit one button and call it a day? That’s the benefit of one SIM. It’s simple. Instead of managing dozens of carrier invoices, searching your email for payment reminders, and paying each one individually, a single SIM gives you one invoice with one data rate to manage. How do you get this little chip in your hands? We thought you’d never ask. Enter VIoT-Flex, now available from FreeWave. We are the Master Reseller for Velocity IoT, a global mobile virtual network operator (unlike MNOs, MVNOs leverage the services of individual carriers, offering these services with one SIM, one invoice, one data rate plan – and one accountable partner to work with). Along with Velocity IoT, we’re making IoT more accessible and scalable to a variety of remote industrial operators. VIoT-flex delivers seamless cellular coverage with no coverage gaps for OT networks. Over-the-air updates keep connectivity solutions up-to-date. Here’s why solving the multi-SIM problem was so important for us. We look at the data journey holistically. We saw customers in remote parts of the world struggle with keeping track of multiple SIMs, especially as they added remote devices. (There’s no turning back – IIoT is expanding! IoT analytics predicts the number of connected IoT devices globally to reach 18.8 billion by the end of 2024, up from 16.6 billion at the end of 2023.) They wrestled with tracking of multiple invoices, multiple carriers – and multiple IMSIs (each mobile network operator has an International Mobile Subscriber Identity number). Carriers like AT&T and Verizon in North America, Rogers® in Canada, Telefónica® in Mexico each have their own IMSI numbers. When you turn on the cell modem, the IMSI looks at the modem to see what tower it can connect to. In the simple sense, the IMSI is programmed into the SIM card. With one SIM, if the modem can’t connect to the first carrier, it simply goes to the next one. Our single SIM seamlessly switches between cellular carriers and supports satellite NTN (non-terrestrial networks), ensuring reliable coverage in remote locations. Want to learn more about VIoT-Flex? Get details here. VIoT-Flex is like managing one SKU in your product stack. With VIoT-Flex, customers now have access to a vast global carrier library bridging local core mobile networks. With a three-in-one form factor, VIoT-Flex comes in 2FF normal, 3FF micro, and 4FF nano as well as embedded SIMS (eSIMs), which we’ll address in a moment. VIoT-Flex SIMs are made to withstand extreme temperatures, from a blustery -20 °C to a super hot +85 °C. VIoT-Flex eSIMs operate in -40 °C to a super hot +105 °C. Now, imagine one SIM with multiple IMSIs to SIMplify (we had to do it!) your life: One cellular invoice across many One data rate plan across many Only pay for data transmitted Global reach: 600+ carriers in 190+ countries Low latency with 2G, 3G, 4G, LTE-M and NB-IoT No roaming fees, complex zoning tariffs, sub-optimal data pools, fixed contracts or time-consuming debugging Only FreeWave’s VIoT-Flex gives you access to an enterprise data platform so you can manage and program SIMs and data plans from one location. There’s the short story of how multiple IMSIs become one – giving users one invoice, one SIM for global cellular coverage. Breathing deeper? eSIMs Reduces Costs and Make OEM Products Smarter – even in Frigid Nebraska Winters Embedded SIM cards are called eSIMs. They are soldered right onto a device’s radio board for seamless wireless connectivity over a cellular network. OEM manufacturers use this because it protects the SIM from cracking or shrinking if it’s too cold or expanding and
FreeWave Technologies, NetFoundry, and Keyfactor Announce a Triumvirate for IIoT Connectivity Security Services

Boulder, CO – January 28, 2025 – FreeWave Technologies, a leader in industrial wireless connectivity and Industrial Internet of Things (IIoT) solutions, has integrated the technology of NetFoundry and Keyfactor to deliver unparalleled security and simplicity for IIoT connectivity. This triumvirate leverages Zero Trust principles and architecture from the field’s foremost leaders, setting a new standard for network security in remote and embedded industrial edge operations. FreeWave Technologies has implemented this stringent security methodology into its IIoT network portfolio. “Based on the criticality of secure connectivity in today’s hyper-connected world, we looked for a team that could push us beyond what’s common with VPN and APN security practices today. Leveraging Zero Trust principles and techniques will help our customers move away from once-trusted VPNs to something that is impermeable to threats. FreeWave’s Zero Trust overlay applies the strictest security practices on every user, device, and application in our customers’ networks. Our deny-by-default model ensures no bytes or access requests are allowed, until explicitly authenticated and authorized with strong identity,” said Steve Wulchin, CEO of FreeWave Technologies. FreeWave Technologies: Leading the Charge in IIoT Connectivity FreeWave Technologies’ innovation has consistently been at the forefront of industrial connectivity, providing robust and reliable IIoT solutions tailored to the unique challenges of remote operations for three decades. Our key features include: Enhanced Connectivity: Leveraging global satellite and cellular networks, along with our proprietary radio communications, FreeWave ensures seamless communication in even the most rugged and remote locations. Real-Time Data Visualization: Users benefit from real-time data visualizations, alerts, and alarms, crucial for optimizing operations, understanding usage patterns, and addressing issues promptly via our Platform-as-a-Service data platform solution. NetFoundry: Zero Trust Secure Connectivity Designed into your Products NetFoundry, a pioneer in Zero Trust security, is driving a paradigm shift worldwide that enables product builders like FreeWave to embed secure overlay connectivity directly into their industrial-grade products and applications. Key features and benefits include: Secure By Design Solution Offers: Connected products become unreachable from underlay networks, utilizing their own, embedded, global zero trust connectivity. Simplified and Scalable Operations: Increased adoption of products and services by eliminating inefficient dependencies on customer’s infrastructure, identifiable IP addresses, vulnerable VPNs, and complex firewall configurations. Business Velocity and Acceleration: NetFoundry’s OEM Partners quickly deliver new connected product offers to the world’s most security conscious customers, exceeding EU CRA, NIST 800-171, and IEC 62443 standards without long development cycles. “FreeWave has designed NetFoundry’s industry-leading, embedded Zero Trust connectivity into their powerful IIoT solutions, making adoption super simple and secure for their customers. The integrated solution means FreeWave customers do not need to waste time and money to build their own secure networking infrastructure, nor do they need to disrupt existing firewalls and network routing configurations. We are proud to partner with FreeWave to help them serve IIoT customers with excellence”, said Galeal Zino, CEO of NetFoundry. Keyfactor: Ensuring Trust with Comprehensive Digital Identity Security Keyfactor, the leader in digital identity security, specializes in protecting the integrity and authenticity of data and devices with: Public Key Infrastructure (PKI): Keyfactor provides comprehensive PKI solutions to manage and secure digital identities across IIoT devices, ensuring data integrity and trust. Certificate Lifecycle Automation: Automates the management of digital certificates, reducing the risk of expired certificates and potential security vulnerabilities. IoT Device Security: Ensures that every IIoT device is authenticated and authorized, preventing unauthorized devices from accessing critical networks. “With the rise of IIoT, ensuring the security and integrity of every device and data point is crucial. Our collaboration with FreeWave and NetFoundry brings together the best in connectivity, network security, and digital identity management to safeguard industrial operations,” said Ellen Boehm, SVP, IoT Strategies and Operations at Keyfactor. A Synergistic Solution for Unmatched IIoT Security FreeWave’s implementation of this security technique marks a significant milestone in advancing IIoT security standards for remote IIoT networks. By combining FreeWave’s expertise in industrial connectivity, NetFoundry’s Zero Trust networking, and Keyfactor’s digital identity management, customers can rely on a comprehensive security solution that addresses the most pressing challenges faced by remote industrial operations. Key Benefits of the Triumvirate: Enhanced Security: Authenticate-before-connect and no inbound FW ports means no network requests or bytes of data can be sent, minimizing the potential risks of network attacks, hacks, and device insecurities. Seamless Integration: Clients benefit from a unified IIoT solution that integrates robust connectivity, advanced network security, and digital identity management. Operational Efficiency: Real-time data insights and secure connectivity enable clients to optimize their operations and reduce downtime. Scalability and Flexibility: The combined solutions ensure that clients can scale their operations efficiently, adapting to evolving industry demands. Visit the FreeWave Technologies’ website to learn more about the latest IIoT network developments and how this collaboration is setting new standards in the industry. ### Press Contacts FreeWave TechnologiesSue [email protected] NetFoundryMichael [email protected] KeyfactorMarketBridge for [email protected]
Transforming Vulnerable VPNs with Zero Trust Security in 2025 is Sound Cyber Strategy

As the world becomes more connected and cyber villains get smarter, networks for remote operators are fair game to threats and cyber risks. Chief Technology Officers (CTOs), Chief Information Officers (CIOs), and Chief Information Security Officers (CISOs) are tasked to protect data, people, and reputations. Here, we explore why VPNs come up short while zero trust puts you ahead. CTOs, CIOs, and CISOs, you are the cyber watchdogs of your organizations, so this message is for you. In a previous blog written for C-suite leaders, we established that VPNs can come up short for keeping internal networks, including machinery, control systems, and databases, secure from the increasingly savvy hacker. Why does this matter? When we talk about the internet of things (IoT) today, everything is connected to the internet, from your watch or phone to thousands of business assets like machinery, sensors, and industrial equipment. With only a VPN standing guard, a hacker can get into your network through your facility’s smart thermostat (lest we forget the casino fish tank data hack of 2017). For decades, FreeWave has provided industrial IoT solutions for companies in oil and gas, agriculture, mining, water treatment, and other remote industries, to help them overcome a variety of network productivity issues and give them peace of mind that the health of their network – and the assets connected to it – is robust and secure. We believe, whether it’s working with our channel partners or adding our equipment to an OEM’s solution, that there are four essential security outcomes companies investing in IIoT should strive for: Secure remote monitoring and data management Automated, decisive response to threats No to low network vulnerabilities Cost savings compared to traditional VPN-based security Decommissioning a VPN as a primary source of cybersecurity in favor of zero trust network access (ZTNA) creates a stealthier, easier-to-use framework to detect and deflect cyber-attacks. Cybersecurity in the Wild West It is widely understood that Europe has continuously been five to 10 years ahead of the United States when it comes to cybersecurity. This is because the United States is like the freewheeling wild west. Cyber attacks cost companies billions of dollars. In IBM’s Cost of a Data Breach report for 2024, companies averaged a loss of $4.88 million, which is a 10% increase over 2023. More specifically to VPNs, the 2024 ThreatLabz VPN Risk Report published by Zscaler says that 78% of organizations plan to implement a zero trust strategy in the next 12 months with 91% of respondents concerned that VPNs will lead to a “compromising breach.” The survey says top threats to VPN vulnerabilities are ransomware (42%), other types of malware (35%), and DDoS (distributed denial-of-service which are attempts to overwhelm a server or network) attacks (30%). The findings make sense. Let’s say you notice nefarious traffic going across your network and you realize it is a former employee who still has access because their VPN credentials were not completely shut off. Even after you took their computer, they were able to go to their own computer, fire up a VPN and use their credentials to get into your network. VPNs are like a house – once you’re in, you’re in. Now you are faced with spending valuable time dealing with this behavior and any resulting damage. In contrast, a zero trust network promptly and fully blocks attackers from any access in the first place, making your job of monitoring considerably easier. As a tech leader, imagine what that level of security could do for your peace of mind as well as your company’s risk landscape. Zero trust is not new, but it has evolved. It was first coined in 2010 to protect enterprise networks, cloud networks, and basic IT networks. Two obstacles to zero trust are based on dangerous assumptions. One is that, while cyber attacks happen every day, they won’t happen to you. The other is that upgrading to ZTNA is too costly. If you’d like to explore why both are myths, give us a holler. To protect your data and network, start exploring the lowest level of your system and work from there. These questions are a good start to finding and closing vulnerabilities. What are your highest priority assets to protect? How will you handle encryption across diverse environments? Are you buying devices designed to implement zero trust? Are you buying network routers that are better suited for zero trust enablement? Are you developing edge networks with zero trust architecture to prevent people from plugging into an ethernet port on your network and destroying the site? What would be the potential harm to the business if your data and network were compromised? If you don’t have answers to all these questions, take heart. FreeWave has the capacity to interface with companies on their third-party applications that are not zero trust enabled. We manage this through what we call a “demilitarization zone,” where we have an unsecure system and a secure system and we match them together and know that the unsecure system is authenticated. We set up the entire network to avoid potential threats. Many remote, industrial operations have multiple locations to manage. A company with 10,000 sites – what we call the Razor’s Edge© where the data lives – would otherwise have to send its IT techs out to every site to implement a security platform. That means work, time, and expense. FreeWave is simplifying IIoT data by developing an easier pathway to zero trust on edge networks. Imagine sending a zero trust enabled device out to each site, installed on a network in minutes, while protecting said network down to the desired granular level. In the world of devices, the idea that a device can be designed and manufactured so that it is zero trust secured as it comes off the production line has been getting a lot of traction over the last five years. This approach is miles ahead compared to when VPNs were first introduced. You can always tap into FreeWave’s
One SIM, Limitless Possibilities: FreeWave Unveils Comprehensive Global Cellular IoT Connectivity

BOULDER, CO – November 25, 2024 – FreeWave Technologies, a top global player in Industrial IoT networking and data management has been named Master Reseller for Velocity IoT and will begin reselling cellular IoT connectivity services, immediately. FreeWave’s expansion of its global IoT solutions and connectivity services, now includes cellular connectivity with a single SIM that provides smart connectivity, enterprise management platform and support for more than 190 countries and 600 carriers in a single and simplified rate plan bill. Offering the largest hyperlocal, global data network, providing centrally managed local connectivity for any cellular IoT device, anywhere. Gain direct network access, control your connectivity, monitor devices, access real time events, switch operators remotely, and troubleshoot ahead of time for seamless device performance. The benefits of cellular IoT anywhere include: One Global SIM Card for all carriers with direct-to-carrier reliability and performance Future-Proof Connectivity with over-the-air updates. Auto-Carrier Switch to ensure the best possible coverage and connectivity Device Agnostic allows most cellular IoT devices to connect “We are always striving to provide the best possible solution, at the best possible cost to our customers. Optimizing existing cellular management and connectivity costs will increase our customers’ profitability. With our solution, FreeWave customers will not pay customary charges for set-up, activation, and best yet, our customers will be in full and direct control of their data management they also will not be charged for inactive SIMs.” Said Michael Tate, Chief of Operations and SVP of Sales and Marketing at FreeWave. For industries with remote asset management like agriculture, utilities, energy, and production, pairing this new service with FreeWave’s popular remote IoT network solutions means reducing costs and boosting efficiency. “We’re thrilled to partner with FreeWave to bring our intelligent cellular connectivity solutions to their customers, offering flexible, multi-network coverage with the reliability and reach businesses need to operate globally. FreeWave’s dedication to best practices and durable IoT solutions guarantees smart connectivity for the future. Their legacy solutions, many of which have been in place for decades, truly showcase their quality and reliability. We’re excited to have our services integrated into their offerings,” said Ilian Papasov Head of Market Strategy at Velocity IoT. To learn more about the new global SIM solutions available now from FreeWave, visit here or call 866.923.6168. About FreeWave TechnologiesBased in Boulder, Colo., FreeWave Technologies is an IIoT data solutions provider that believes data unlocks true business transformation for those operating in the hardest-to-reach places on earth. For more than 30 years, the company has equipped remote industrial operators with edge intelligent radios and solutions – manufactured in the United States – to optimize the extreme edge of their operations. Today, FreeWave integrates its powerful Insights™ data platform, data visualization through a single pane of glass, remote monitoring at the edge, and turnkey connectivity – including satellite – to create an intuitive path from operational data to extraordinary decision-making for business transformation at scale. Visit www.freewave.com to get started. About Velocity IoTBased in Orlando, Florida, Velocity IoT is a global connectivity provider dedicated to making IoT accessible, scalable, and seamless for businesses of all sizes. With a global carrier library interconnected through local core mobile networks, Velocity IoT delivers low-latency, high-performance, and regulatory-compliant connectivity that overcomes roaming restrictions—all through a single SIM and vendor relationship. Gain access to real-time network insights, remote SIM management, and automatic carrier switching to ensure uninterrupted, future-ready IoT connectivity. As a trusted partner, Velocity IoT empowers clients to fully harness IoT with tailored solutions that simplify connectivity, reduce complexity, and drive impactful business results. Visit https://www.velocityiot.io to learn more. Press ContactsFreeWave TechnologiesSue [email protected] Velocity IoTNatasha [email protected]
Why Choosing Zero Trust Network Access Over Virtual Private Networks is a C-Suite Decision

You’re leading the company. Why do you need to care about your business’ network security approach? The answer comes from something all too familiar: the accelerated rate of change – and the quest by modern leaders to build a resilient company. PwC describes today as the “age of continuous reinvention” in its 27th Annual Global CEO Survey report. One of the most startling findings is that 45% of CEOs do not believe their company will be viable in 10 years if it stays on the current path. Part of the challenge is knowing what could take your company down. Cybersecurity vulnerabilities at the network level is on the list. PwC’s report shows that CEOs who believe their organization is viable for more than 10 years perceive inflation (21%) and cyber risks (21%) as top threats with macroeconomic volatility (20%) just a half-step behind. As chief technology officer for FreeWave, part of my role is to find weak spots in a network connected to the industrial internet of things (IIoT). I talk to many senior leaders from companies in the oil and gas, agriculture, mining, water treatment and other remote industries. What’s the number one pushback I run into? They tell me they use virtual private networks (VPNs). I call this “pushback” because, at FreeWave, we don’t let VPNs into our data platform. At their most basic level, VPNs are used to create a secure connection between a user’s device and the VPN server. Through that connection, data is encrypted, and a user’s IP address is hidden. As a result, VPNs can allow remote users to securely access internal networks, including machinery, control systems, and databases. For those who may not be familiar with a VPN (although we’ve all probably used one at some point), here’s a simple analogy. Think of a VPN as a tunnel buried far below intersecting highways. One end of the tunnel is an IIoT device and the other end is the server. Your car (let’s make it a Maserati, while we’re at it) is a data packet. Instead of traveling across potentially dangerous highways where threats abound (a malicious attempt to steal your Italian beauty and hold it for ransom, as an example), you take the tunnel built just for you and other authorized drivers you trust. The challenge today is that the tunnel is no longer safe. Why Are VPNs Insecure? Technology ages faster than a male tsetse fly. Our tiny-winged friends hit their teenage years by week two or so. In contrast, technology ages by the nanosecond. I think the reason why many people use VPNs is the same reason hackers infiltrate them so easily. VPNs are old technology. They have long been the go-to solution for providing remote access to industrial control systems (ICS) and other critical infrastructure. They were born during the rise of the internet late last century. One solution begets other problems. The world wide web went from 3 million to 16 million users between 1990 and 1995 (today, there are 5.45 billion users, around 67% of the population). As a result, a group led by Microsoft sought a solution to growing security concerns. That’s how VPNs were born. To be fair, there are ways to make VPNs secure, but the enormous expense doesn’t make financial sense for most companies. Here are three reasons why VPNs cause concerns when protecting an IIoT network: VPNs have outdated authentication models. Username and a password is all you need. I can get into a VPN easily. VPNs are a single point of failure. If something goes wrong with the server, you can’t get in. If I’m a hacker, the best way to take down every remote access in the world is to take down the VPN server. VPNs are hard to monitor. The actual traffic on the network makes it hard to identify nefarious activity flying across it. Let’s say you have this machine on the edge (edge is simply the source of where your data is – this might be where oil is drilled in upstream oil and gas, for example). The data is being processed on that machine (edge computing) and is connected to the corporate network via a VPN. A disgruntled employee leaving the company can sit in their car and use their username and password to access the device through a cellular system. What is the potential damage? In 2020, several prominent VPNs experienced critical vulnerabilities that allowed attackers to bypass encryption and access systems. The Colonial Pipeline attack, for example, was traced back to a legacy VPN, according to then CEO Joseph Blount. The East Coast company paid hackers $4.4 million to restore service quickly. VPNs create easy targets. Once you’re in, you have free rein to do what you want. Solving the Challenge to Scale Network Security A report by McKinsey and Company predicts 50 billion devices will be connected to the IIoT by 2025. The pace of change, according to the report, has increased tenfold. This means the risks and insecurities behind VPNs for organizations, especially remote industrial leaders, are rising. I talked to a large agricultural company recently that uses a VPN. Here’s how the conversation went: Them: How can we add 20,000 sites to our system? Me: We’d have to add 20,000 VPNs. Them: Wait, what? Me: It’s really difficult. VPNs are hard to scale. One VPN is one thing, but many VPNs are a nightmare. We believe a better way to secure a network is to use Zero Trust Network Access (ZTNA). ZTNA creates a network fabric using the principle of least privilege access (PoLP). The premise: trust no one. Each user accesses only the data they need. See how the lens flips from inside out to outside in? In a ZTNA, each user has a policy. This means they are authenticated for access to specific areas. The disgruntled employee mentioned earlier? They cannot go anywhere in the fabric without authorization. Even better, that user’s access can be easily removed or revoked. Ever
The #1 Strategy Remote Industrial Operators Need to Win the AI Race

From the inaugural Olympics in 776 B.C. until today, one thing has remained the same: athletes bring gritty, physical prowess to their chosen sport – and the human desire for excellence. Of course, other things like culture, fashion, and technology have changed dramatically (thankfully, since athletes in the first Olympics competed naked!). In the Olympic Games Paris 2024, one game changer is the role of artificial intelligence (AI). Remote industrial operators looking to scale business value and improve decision-making through edge data, take note: the Olympics, watched by 3 billion people from around the world, is deploying AI to improve future performance of their event. According to an article published by the International Olympic Committee (IOC), AI and digital twinning are being used as an efficiency booster for future Olympic games – from energy consumption to identifying the best places to place cameras and power sources. “The expectation for a lot of people is ‘I’ll just AI it.’ It’s like a magic wand.” One thing AI demands is historical data. This is why we are so passionate about industrial operators owning their data. Without data ownership, it’s a false start when using large language models to train and leverage AI algorithms. In the article entitled “AI and Tech Innovations at Paris 2024: A Game Changer in Sport,” Ilario Corna, the IOC’s chief technology officer said, “We started gathering various operational data as far back as 2020, to look at how we can make the management of the Olympic Games more efficient.” Ryan Treece, global business development manager – data platform & AI solutions at FreeWave, has seen AI evolve over the past decade. He says companies that don’t give customers rights to their data are putting them at a disadvantage. “The thing is that those who own their data will eventually win because they can use it while others will start from zero.” Catching up over time, he points out, becomes increasingly difficult as competitors advance. Companies that secure data ownership today are the ones who will lead tomorrow or, in Olympic terms, will earn gold in the AI race. That’s one reason FreeWave drafted the IIoT Bill of Rights (data governance is amendment one) – as a way for remote industrial operators to leverage technology for future growth and opportunities. Importance of Data Ownership in the Age of AI Owning your data is not just a competitive advantage; it’s a necessity. “There are a lot of AI solution providers,” Ryan explains. “The expectation for a lot of people is ‘I’ll just AI it.’ It’s like a magic wand. Look into the future, though, and ask: What do vendors like? Reliance on their systems.” Ryan says there is no one “mega-solution” out there to solve every problem, but, if there’s one thing he hopes industrial operators know it’s that data ownership means leveraging your data for operational and business performance. “We’re targeting predictive maintenance to prevent machines from going down, reduce fuel waste just to see if a machine is running dozens or even hundreds of miles away, and increase efficiencies so people are not wasting time and energy resources. Data creates long-time success.” Just as the IOC is using AI to create more efficiency in the future, he says understanding data over time enables industrial operators to continuously improve. While still under development, FreeWave is building its AI solutions around domain expertise. Through its FreeWave® Insights™ data platform, it’s connecting decision-makers with data at the edge via sensor technology, pulling in SCADA system data as well. He cites vibration tension sensors as an example. If a rotating asset like a bearing, for example, wobbles, an alert is sent to a single pane of glass – a dashboard connected to the Insights data platform. From there, a technician can add the issue to his planning schedule. Ryan shares the story of when he lived in Michigan. An automotive manufacturer that made panels, a “tier one supplier” in the industry, didn’t have the budget to climate control the entire building. In hot, humid weather, the adhesive failed. Since variables change over time, he says, IIoT solved the problem. “Vibration and temperature data from sensors showed the numbers going up and down. Historical data tells us to change the adhesive or turn up the AC or ramp up the climate control when needed. The manufacturer and its solution providers knew what knobs to turn by identifying trends in a specific period.” That’s why, he says, data ownership is so important. Without data, AI becomes impossible. Solve – and Simplify – Operational Problems “We’re working on solutions that reduce the tech stack and address specific problems like predictive maintenance and trends analysis of sensor data,” said Ryan. “When I’m thinking data, I’m thinking of a huge Excel spreadsheet.” Real-time monitoring of temperature, vibration, or water levels, for example, are important variables for industrial leaders: oil and gas producers with fields in remote or rural areas, large-scale agricultural operations with water pump stations dotting thousands of acres, or public and municipal providers with aging infrastructure in need of robust, remote network strength. These are places, Ryan says, that pose a risk for people to perform daily or weekly monitoring. Ryan points to his hometown of Austin, Texas, where the energy grid is unreliable, especially during hurricane season or super hot summer months. The panels on the grid can overheat. Alerts notify engineers to replace components before problems start. Rather than react, alerts and predictive maintenance reduce downtime. Another example he gives is California where water is a precious commodity. Knowing humidity levels, soil moisture, and water consumption allows agriculturalists to invest minimal resources for better outcomes. AI, he says, optimizes sensor data locally, at the edge, by providing analyses crucial to decision-makers. Failure-Proofing Connectivity Keeps Data in Play Oftentimes, industrial operators don’t have ready access to cellular or Wi-Fi, however, satellite is an optimal solution for areas with questionable coverage and those wanting a strong back-up connection. Pairing satellite with the FreeWave cloud-based Insights platform-as-a-service