Skip to navigation Skip to content

IoT Integrator Summit: Telework Enablement and Security

Minute Read

This presentation was originally delivered during the Secure Remote Work Virtual Summit, which took place on March 31, 2020.

Following is the recording and a session summary of a talk by Michael Flood, the Vice President, Strategy of Kajeet.

Learn more about potential solutions for enterprise and remote connectivity, particularly around the changes influenced by COVID-19. Here are the topics discussed in the video below:

  • Telework Enablement. Equipping remote employees with managed devices and secure access to the software and business applications they need.
  • Cutting Costs on Data Plans. Utilizing wireless data plans with multi-carrier access and data sharing and rollover across devices and networks.
  • Keeping Devices Secure Outside the Office. Mitigate malware and threats and enforce security standards with customized policy controls and IP filtering and blocking.
  • Easy Onboarding and Device Handling. Implement real-time device suspension and activation for easy onboarding or termination.
  • Understanding Employee Data Usage. Use real-time data usage analytics and reporting to understand data usage across your organization.


-- Article continues below --New call-to-action

Visit the IoT Security Resource Center.

Telework enablement and data management

One of the biggest issues that companies are encountering when it comes to creating mobile workforces is network access. While remote employees need access to the network and applications, it may not be possible or required for employees to use a platform that uses an open internet connection. Enabling a closed internet connection keeps devices secure and encourages employees to stay on-task and away from distraction. 

Closed internet connections can also lower data costs when you manage which networks are being used and track traffic on mobile networks. It is much easier to cut data costs when employers are aware of the following:

  1. How networks are being used
  2. When data is being used
  3. Where the data traffic is going


Using real-time data usage analytics and reporting will help you understand data usage throughout your company. 

Telework enablement and security

The best way to enable telework while maintaining high quality security is to enforce security standards with customized policy controls, IP filtering and blocking.

Using broadband policy management and data ratings with real-time view of usage allows managers to understand how data is being used. Content filtering is especially important to keep your workforce on task and to make sure all devices remain secure.

You can also choose to use an enhanced security platform to manage anything that a traditional content filter may not catch. This security platform may block application-specific protocols, malware and more. 

To make it easier for your employees to use the devices you provide them, implement real-time device suspensions and activation for easy onboarding or termination. You want it to be so easy that all you have to do is pull it out of the box and turn it on. 

IoT and enterprise telework enablement solutions

With IoT platforms, it is incredibly useful to implement management, analytic and integration software for telework. Here are a few ways that Michael Flood encourages organizations to enable secure telework:

  • Enable data usage processing and analytics. This will help you understand data usage going across carriers. 
  • Implement mobile device management software in order to keep track of employee uses. 
  • Implement security management and threat protection. Use a software that works with your security architecture and network connection to provide a more secure device. 
  • Enable application integration. With all of these capabilities, you want software that can integrate these into third party platforms and applications using APIs. 
  • Use a secure and private network. Data should travel from the end device to the carrier network through the LTE core and over secure encrypted tunnels to the infrastructure. Traffic that was not meant to go into the internet should not end up there.


Looking for content from other IoT Integrator Summit Sessions?

Browse all of the session recordings.

IoT Security Event Recordings - Securing Edge Computing

Q & A From Listeners

Here are some questions submitted by listeners.

Can individual Kajeet devices switch from carrier to carrier? 

That depends on the device type. In a typical Kajeet SmartSpot, it is carrier specific. However, Kajeet does have the capabilities to provide devices that can switch from carrier using failover with one modem or multiple modems. Using multiple modems would help to expand aggregated data and coverage.

Has Kajeet obtained IEC 62443, 33, 41, and 42 certification or does the product meet those requirements?

No, Kajeet is not IEC certified. This is because Kajeet plays more of a consultative role in the actual manufacturing process. Often, the only physical part that Kajeet provides is a SIM card. 

How many devices can one Kajeet hotspot support?

A typical mobile Kajeet hotspot can accommodate up to ten devices. If you would like to support many more devices than that, we would have to use a higher-end network. Kajeet works with both small schools and some of the largest school districts in the country. When it comes to other markets, Kajeet focuses on embedded solution providers. 

To what degree are Kajeet devices constrained by coverage limitations?

Unfortunately, if there is no cellular service, Kajeet devices will not be able to connect to a carrier and provide internet. However, Kajeet does have the capabilities to reach into alternative network provisions. For example, larger scale routers with higher power can get much better coverage in areas with nearby cellular service. Multi-carrier modems also can help with this problem by switching to the carrier with the strongest signal. 

Read the Complete IoT Security Guide

Everything you need to know about securing your IoT or IIoT deployment.

Read Now

About Michael

As Vice President, Strategy at Kajeet I lead Kajeet's Education business including overall strategy, business development, channel strategy, product management and strategic sales. Externally, I serve as liaison to the Education community for media and public relations, association memberships (CoSN, ISTE, NMC/Horizon, CGCS, etc.) and events.

I have served on Advisory Boards for EdNET, WirelessEdTech and ISTE SIGML. I am a member of the Emerging Technologies Committee and advise the Leadership for Mobile Learning Initiative for the Consortium on School Networking (CoSN). In 2013 I was recognized as CoSN's Private Sector Champion of the year. I was co-chair for the CoSN Annual conference 2015-2017.

I have served as Chairman of the Board of Advisors for AIESEC at Georgia Tech, a non-profit and served on the corporate Board of Directors for Explora Phones, a start-up based in New York.

Additional professional background includes management, solutions engineering, government, utilities and international business.

Personal interests include emerging technologies, futurism, youth development, globalization, business strategy, negotiation and education transformation.

Specialties: Mobile Learning, Education Technology, Vertical Strategy, Business Case Design, Ecosystem Development, Financial Analysis, Forecasting, Team Leadership, Sales Management, Public Sector and Education Industry Expertise, Program & Pricing Design, Customer Management, Public Relations and Media, Project Management, Deployment, Messaging Solutions, Emergency Communications, Consulting, Wireless, Business Process Automation, Mobile Application Design, GPS Tracking and Location Based Services.

About Kajeet

As IoT connectivity becomes central to business and industrial applications, managing data consumption and maintaining reliable wireless service will become even more critical to staying competitive. Kajeet’s network- and device-agnostic management platform offers enterprise customers the ability to easily monitor and manage data usage across millions of devices across the globe for improved efficiency.

The Complete Guide to IoT Security